• Elian Script encoding method as requested.
• Fixes and error handling based on crash reports.
● Ad Free Unlocked
Cryptography
Cryptography may be a cipher, hashing, coding and learning tool for all ages.
Ciphers
• Scytale cipher.
• Atbash cipher.
• Caesar cipher.
• Rot one – twenty five cipher.
• Affine cipher.
• fencing cipher.
• Keyword cipher.
• Beaufort cipher.
• Templar Cipher with image send feature.
• orifice cipher.
• Vigenere cipher.
• Gronsfeld cipher.
• Autokey cipher.
• Bacon Cipher.
• Chaocipher.
• Adfgvx cipher.
• Playfair cipher.
• Two-Square cipher (currently encrypt).
• Tri-Square cipher (currently encrypt).
• Four-Square cipher (currently encrypt).
• One-time pad.
• divided cipher.
• divided cipher.
• Hill Cipher with editable Matrix.
• Visual Cryptography.
• Enigma cipher with saveable settings.
• RSA cipher with custom keys
• Blowfish cipher
• Twofish cipher (next info Blowfish)
• Threefish cipher
• Rijndael (AES) cipher
• SCrypt (Password-based key derivation perform, in progress)
• Elliptic Curve Diffie-helleman AES, almost like Curve25519
• ChaCha cipher (Salsa20)
• Cast5
• Cast6
• Shacal2
• Shamir’s Secret Sharing (SSS) rule.
• RC2
• RC4
• RC5
• RC6
• Triple DES
Hashes
• Whirlpool zero / one / W (hashing)
• HMAC – SHA1 / SHA256 / SHA512 (advanced hashing)
• Adler32 (hashing)
• CRC – eight / sixteen / twenty four / sixty four (hashing)
• ELF-32 (hashing)
• FCS-16 (hashing)
• HAS-160 (hashing)
• MD-2/4/5 (hashing)
• RIPEMD – 128 / one hundred sixty / 256 / 320 (hashing)
• SHA – zero / one / 224 / 256 / 384 / 512 (hashing)
• Tiger – T / T2 / 128 / one hundred sixty (hashing)
• add – eight / sixteen (hashing)
• Xor8 (hashing)
• GOST (hashing)
• BCrypt (hashing)
• PBKDF2 (hashing) with java|php example.
• SipHash hashing rule.
• hank hash.
• Keccak hash.
• Argon2 hash. (remote api)
Encodings
• Base32
• Base64
• Base85 | Ascii85
• Base91
• code encoder with sound playback. Sound is also annoying.
• Braille
• Semaphore
• Tap Code
• sign language (American Sign Language)
• Pigpen
• Betamaze
• A1Z26
Tools
• Encrypted QR codes reader for supported ciphers.
• Crypto courier End-to-End encrypted electronic communication. (My new app associated with this).
• User Puzzles.
• verification tool for text and files.
• Custom Hmac SHA 1/256 + SHA256 positive identification authentication digest creator tool. (java|php examples)
• File encoding Tool. scan tutorial from links that square measure enclosed in rationalization read or in tool punctuation mark.
• Hash Cracker for MD5 and SHA1 hashes (work in progress).
• positive identification Strength checker tool.
• Frequency Analysis.
• ASCII table (8-bit/255) with search perform.
• Binary, positional representation system, Decimal and positional representation system table with search perform.
• Text Binary device.
• Decimal Binary device.
• positional representation system Binary device.
• Integer(number) Binary device.
• Pseudo Random variety Generator (PRNG) with rationalization.
• AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases.
• Steganography, cipher decode tool in build.
• ASCII Font Art tool.
– Includes link to excellent on-line SHA1 cracker.
Algorithms
• Blum Blum Shub generator.
• Haversine formula.
Others
• Kryptos sculpture.
• Voynich manuscript.
• Dorabella’s letter.
• Beale ciphers.
• Ricky megahertz Cormick documents.
• Zodiacs cryptograms.
Messaging
• Experimental electronic communication feature victimisation RSA with custom keys and uneven exchange system.
– I don’t collect personal info and this app isn’t causation non-public key’s anyplace. I’m describing this half on link below. Please scan it.
• scan however it works and wherever knowledge goes, from here: http://www.nitramite.com/messaging-guide.html
Cryptography may be a cipher, hashing, coding and learning tool for all ages.
Ciphers
• Scytale cipher.
• Atbash cipher.
• Caesar cipher.
• Rot one – twenty five cipher.
• Affine cipher.
• fencing cipher.
• Keyword cipher.
• Beaufort cipher.
• Templar Cipher with image send feature.
• orifice cipher.
• Vigenere cipher.
• Gronsfeld cipher.
• Autokey cipher.
• Bacon Cipher.
• Chaocipher.
• Adfgvx cipher.
• Playfair cipher.
• Two-Square cipher (currently encrypt).
• Tri-Square cipher (currently encrypt).
• Four-Square cipher (currently encrypt).
• One-time pad.
• divided cipher.
• divided cipher.
• Hill Cipher with editable Matrix.
• Visual Cryptography.
• Enigma cipher with saveable settings.
• RSA cipher with custom keys
• Blowfish cipher
• Twofish cipher (next info Blowfish)
• Threefish cipher
• Rijndael (AES) cipher
• SCrypt (Password-based key derivation perform, in progress)
• Elliptic Curve Diffie-helleman AES, almost like Curve25519
• ChaCha cipher (Salsa20)
• Cast5
• Cast6
• Shacal2
• Shamir’s Secret Sharing (SSS) rule.
• RC2
• RC4
• RC5
• RC6
• Triple DES
Hashes
• Whirlpool zero / one / W (hashing)
• HMAC – SHA1 / SHA256 / SHA512 (advanced hashing)
• Adler32 (hashing)
• CRC – eight / sixteen / twenty four / sixty four (hashing)
• ELF-32 (hashing)
• FCS-16 (hashing)
• HAS-160 (hashing)
• MD-2/4/5 (hashing)
• RIPEMD – 128 / one hundred sixty / 256 / 320 (hashing)
• SHA – zero / one / 224 / 256 / 384 / 512 (hashing)
• Tiger – T / T2 / 128 / one hundred sixty (hashing)
• add – eight / sixteen (hashing)
• Xor8 (hashing)
• GOST (hashing)
• BCrypt (hashing)
• PBKDF2 (hashing) with java|php example.
• SipHash hashing rule.
• hank hash.
• Keccak hash.
• Argon2 hash. (remote api)
Encodings
• Base32
• Base64
• Base85 | Ascii85
• Base91
• code encoder with sound playback. Sound is also annoying.
• Braille
• Semaphore
• Tap Code
• sign language (American Sign Language)
• Pigpen
• Betamaze
• A1Z26
Tools
• Encrypted QR codes reader for supported ciphers.
• Crypto courier End-to-End encrypted electronic communication. (My new app associated with this).
• User Puzzles.
• verification tool for text and files.
• Custom Hmac SHA 1/256 + SHA256 positive identification authentication digest creator tool. (java|php examples)
• File encoding Tool. scan tutorial from links that square measure enclosed in rationalization read or in tool punctuation mark.
• Hash Cracker for MD5 and SHA1 hashes (work in progress).
• positive identification Strength checker tool.
• Frequency Analysis.
• ASCII table (8-bit/255) with search perform.
• Binary, positional representation system, Decimal and positional representation system table with search perform.
• Text Binary device.
• Decimal Binary device.
• positional representation system Binary device.
• Integer(number) Binary device.
• Pseudo Random variety Generator (PRNG) with rationalization.
• AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases.
• Steganography, cipher decode tool in build.
• ASCII Font Art tool.
– Includes link to excellent on-line SHA1 cracker.
Algorithms
• Blum Blum Shub generator.
• Haversine formula.
Others
• Kryptos sculpture.
• Voynich manuscript.
• Dorabella’s letter.
• Beale ciphers.
• Ricky megahertz Cormick documents.
• Zodiacs cryptograms.
Messaging
• Experimental electronic communication feature victimisation RSA with custom keys and uneven exchange system.
– I don’t collect personal info and this app isn’t causation non-public key’s anyplace. I’m describing this half on link below. Please scan it.
• scan however it works and wherever knowledge goes, from here: http://www.nitramite.com/messaging-guide.html