CEX for Windows Free Download in Encryption & Decryption Software Tag

     
Tags
Games  CAD Software  Privacy Software & Access control  Video Players  Security Software  Developer Tools  Graphic Design Software  Drivers  Educational & Science Software  Disk & File Software  Video Software  Audio Software  Networking Software  Wireless Networking Software  Communication Software  3D Modeling Software  Digital Photo Software  Internet Software  Database Management Software  Business & Office Software  System Utilities 
Search by Category
Audio Software
Browsers
Business & Office Software
CD & DVD Software
Communication Software
Desktop Enhancements
Developer Tools
Digital Photo Software
Disk & File Software
Drivers
Educational & Science Software
Entertainment & Hobby Software
Games
Graphic Design Software
Home & Family Software
Internet Software
iTunes & iPod Software
Networking Software
Productivity Software
Screensavers
Security Software
Anti-Spyware
Antivirus Software
Corporate Security Software
Encryption & Decryption Software
Firewall Software
Internet Security Software Suites
Keyloggers
Password Managers
Privacy Software & Access control
Security Monitoring Software
System Utilities
Travel & Navigation Software
Video Software
Web Development Software
     




 
 
CEX

CEX
Version: 1.0
Platforms: Windows

Categories: Security Software
Upload Date: 27 Dec 14
Developer: Vtdev.com
Distribution Type: Shareware
Price: 29.95 $
Downloads: 5
File Size: 2043 Kb
 

Rating: 0.0/5 (Total votes: 0)


 

CEX is one of the worlds most powerful encryption tools. It is a state of the art document encryptor, loaded with security tools and safe guards combined to protect your sensitive data. There are three strong encryption algorithms included in CEX, all based on the Rijndael encryption algorithm used in AES. RDX uses an extension of the Rijndael encryption algorithm, the same one used in the AES standard. What we have done is to extend Rijndael so that it now accepts a longer key length (512 bits). The extended key length provides more security against attacks that attempt to brute force the key, and also adds eight more rounds to the diffusion algorithm. The increased number of rounds brings the total from 14 rounds with a 256 bit key, to 22 rounds with the 512 bit key size. These added passes through the diffusion algorithm further disperse the input through row and column transpositions, and XOR's with a longer rounded key. RSX is a hybrid of the Rijndael and Serpent ciphers. Most encryption algorithms can be thought of as having two main parts; The key scheduler, and the diffusion algorithm. The key scheduler takes a small amount of initial entropy, (the user key), and expands it into a larger working array that is used in the diffusion algorithm. Rijndael has what is considered a weak key scheduler; it relies on a strong diffusion algorithm to thoroughly whiten the input data. One of the strongest key schedulers is a part of the Serpent algorithm. From the authors of Serpent: "Serpent has none of the simpler vulnerabilities that can result from exploitable symmetries in the key schedule: there are no weak keys, semi-weak keys, equivalent keys, or complementation properties." The result is the best parts of both ciphers have been combined into a hybrid that can encrypt using up to a 512 bit key length. DCS is a type of stream cipher that uses two Rijndael streams in an AES configuration; that is a 256 bit key and 128 bit block size. It creates two AES SIC (Segmented Integer Counter) streams using two unique keys and 128 bit counters. These two independent streams are combined using a logical exclusive OR operation (XOR) to produce a pseudo random output stream. That stream is than XOR'd again with the input data to produce the cipher text. DCS uses a single 768 bit key to generate the random stream, making it invulnerable to brute force attacks. It is also automatically parallelized, designed to run at high speed on multi processor systems.

Limitations:

10-day trial

 
Like it? Share with your friends!   
 

cex_1_1261.png
cex_2_1261.png
cex_3_1261.png
cex_4_1261.png
cex_5_1261.png

 

Other Windows Software of Developer «Vtdev.com»:

V-PadV-Pad
V is for Vernam A Vernam cipher also called a One Time Pad (OTP), or the perfect cipher, is a cryptographic algorithm where plaintext is combined with a random key. It is the only existing mathematically proven unbreakable form of encryption. First patent

» show all

 
Similar Applications:

Chiron FortressChiron Fortress
Chiron Fortress 1.0.5 is a simple application which aims to simplify the process of encrypting important files to keep their contents hidden from those who should not be viewing them. Chiron Fortress uses a familiar explorer type interface to navigate
DRM-Plus Encrypter For WMV/WMA/ASFDRM-Plus Encrypter For WMV/WMA/ASF
DRM-Plus Encrypter For WMV/WMA/ASF is designed to encrypt .wmv, .wma, and .asf media files; the encrypted media files can only be played after obtaining the playback license provided by your Web server. You can set the following playback rights for your co
USBSoftProtectUSBSoftProtect
USBSoftProtect can provide solid security for your files. This software allows you to easily transfer the created .exe with encrypted data via any USB memory device from one PC to another. USBSoftProtect is compatible with any USB flash drive (even USB 1.0
Windows 2000 Group Policy File Vulnerability PatchWindows 2000 Group Policy File Vulnerability Patch
This update resolves the "Opening Group Policy Files for Exclusive Read Access Blocks Policy Application" issue affecting Windows 2000 domain controllers and is discussed in Microsoft Security Bulletin MS02-016. Download it to prevent an attacker from bloc
Odisef Remember PadOdisef Remember Pad
This program is a security software which encrypts your textual data. We assure you that there is no crack available for this software that can break the encryption. Moreover it comes with a nice and simple GUI. You can save your frequently used passwords
BizCrypto for SQL ServerBizCrypto for SQL Server
BizCrypto for SQL Server lets you secure the data, which is stored and transferred via your MS SQL Server Integration Services scripts. When you need to transfer the data securely via SFTP, FTPS or AS2 protocol, you will find the appropriate connection
SecEx MD5+ DigestSecEx MD5+ Digest
From the developer: ""This free secure hash signature utility allows you to create and verify MD5, SHA-1 and RIPE-MD 160 message digests on one or multiple files. SecExMD5+ features a graphical wizard style interface, full integration with Windows expl
SpyBuddySpyBuddy
SpyBuddy is the spy software and computer monitoring product for monitoring spouses, children, co-workers, or just about anyone else! SpyBuddy allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed or the last fil
CryptArchiverCryptArchiver
With CryptArchiver, you can hide, encrypt, and password-protect your important files and folders. Secure data with CryptArchiver. All you do is drag-and-drop your important files and folders into an encrypted drive. CryptArchiver is encryption software for
Password Generator 2004Password Generator 2004
Diplodock Password Generator 2003 is a professional random password generator that can produce 100,000s of passwords, serial numbers, registration codes, masked strings, usernames, and more in seconds. Having features like built-in dictionaries, customizab
 

Supported Operating Systems:
Windows 7 |  Windows 8 | 
 

Comments on CEX:

Comments not found

Name:


Comment:


Enter text from image below:

Turn on images!

 
 
 

Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10

© Pantich 2016 all rights reserved