Function Volume

#344

Overview of all functions in all CrypTool programs.

FunktionCT1CT2JCTCTO

Achterbahn

ADFGVX

ADFGX / ADFGVX

Open

AES

AES

Open

AES

Open

AES MAC

Alphabet

Alphabets

Android Unlock Pattern (AUP)

Ant Colony Optimization (ACO)

ASCII

Open

ASN.1

Atbash

ATBASH

Open

Authentication methods in networks

Autocorrelation

Open

Avalanche effect

Bacon cipher

Barcode

Open

Base 64 encode/decode

Base64

Open

BB84

BB84

Beaufort cipher

Open

Berlekamp-Massey algorithm

Bifid

Bifid cipher

Bit shift

Open

BLAKE

Blind signature

Block mode

Blockchain

Blowfish

Blum Blum Shub (BBS) –

Book cipher

Boolean functions

Byte Addition

Byte Addition

Caesar / Rot-13

Caesar / Rot-13

Open

Caesar / Rot-13

Camellia

Camellia MAC

CBC

Certificate verification

ChaCha

Chaocipher

Chè Guevara cipher

Chinese remainder theorem (CRT)

Cipher identifier

Open

CMSS signature

Coin flipping protocol

Corona / COVID

Open

Cost function

Cramer-Shoup

Crib

Cyclic redundancy check (CRC)

Cylinder cipher

Data flow

Data input/output

Decimalization

DES

DES

DES

DES MAC

DESL

DESL

DESX

DESX

DESXL

DESXL

DGK (homomorphic encryption)

DHA

DHA MAC

Dictionary

Differential cryptanalysis (DCA)

Differential cryptanalysis (DCA)

Dining cryptographers protocol

Discrete logarithm

Divider game

Double box

Dragon

DSA signature

EC calculations

EC calculations

EC

ECC-AES

ECDSA signature

ECIES

ECNR signature

ElGamal

Encoding

Encryption with AES and password

Enigma

Enigma

Enigma

Open

Entropy

Factorization of a number

FEAL

Fialka

FIPS PUB-140-1 (test

)

Fleissner Grille

FORK

FORK MAC

Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF)

Frequency test

Open

Friedman test

Gematria

GMSS signature

GOST Magma cipher

GQ signature

Grain

Gronsfeld cipher

Open

Grøstl

Hagelin Machine

Hamming distance

Hash algorithms

Hash

(collisions)

Hash value of a file

HC128

Heartbleed

HIGHT

HIGHT cipher

Hill cipher

Open

Hill cipher

Histogram

HMAC

Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi)

Homophonic substitution

Homophonic substitution cipher

HTTP protocol

Huffman

Open

IDEA

IDEA

IDEA MAC

IDP

ImageHash

Inverse congruence generator (ICG) (

)

ISAP bit commitment scheme

ISBN

Josse cipher

Kamasutra cipher

Open

Kasiski test

Keccak (hash, cipher,

)

Key derivation function (KDF)

Key exchange (BB84)

Key exchange (Diffie-Hellman DH)

Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy)

Key exchange (multipartite)

Key generation from password (PKCS#5)

Key searcher

Keys (display / export)

Keys (generate / import)

Kleptography (4 methods generating a prime, SETUP

)

Knapsack

Kryptos K1

Kryptos K2

LAMBDA1

Lattice

Lattice

Length of a number

Levenshtein distance

LFSR

Linear congruence generator (LCG) (

)

M-138

M-138

M209

M94

MARS

MARS

MARS MAC

McEliece

McEliece signature

MD

MD2

MD4

MD5

MD5

Merkle signature

Mexican Army cipher

Mexican Army cipher

Mickey 2

Misty

Misty MAC

Morse code

Open

Multiplicative cipher

Open

Multivariate cryptography

N-gram

N-gram

Open

Navajo code

Niederreiter

Nihilist

Nihilist cipher

NLFSR

Number Shark (taxman)

Open

Number theory (also see Primes)

Open

Oblivious transfer protocol (

)

One-time pad (OTP)

OpenSSL

Open

Padding oracle

(POA)

Paillier

Paillier (homomorphic encryption)

Password hash (SHA-1)

Password quality

Password-based key derivation functions

PBES2

PBKDF-1 (PKCS#5 2.0)

Periodicity

PKCS#1

PKCS#5

PKCS#5 AES

Playfair

Playfair cipher

Poker-Test (test

)

Porta

Open

Powering

PRESENT

Primes (generators, tests, factorization, tutorials)

Pseudo random number generator (

)

Pseudo random number generator (

) of the Secude library

Public-Key Infrastructure

Purple

Rabbit

Rabin cryptosystem

Railfence

Open

Randomness

RAPPOR

RC2

RC2

RC2 MAC

RC4

RC4

RC5

RC5 MAC

RC6

RC6

RC6 MAC

Reciprocal subtraction

Redactable signature schemes (RSS)

Redefence

Open

RIPEMD

RIPEMD MAC

RIPEMD-160

Rotation cipher

Open

RSA

RSA

RSA

Open

RSA signature

RSA-AES

Runs-Test (test

)

SAFER+

SAFER++

Salsa20

SAT solver

Scytale

Open

Scytale

Scytale / Rail fence

SDES

SDES

Secure Chat – Applied Cryptography

Secure email (S/MIME)

Serial-Test (test

)

Serpent

Serpent

Serpent MAC

SHA

Open

SHA MAC

Shacal

Shacal MAC

Shamir's secret sharing (

)

Shamir's secret sharing (

)

Shanks Babystep-Giantstep

SIGABA cipher

Signature

Signature extraction

Signature verification

Simple multi-client communication – Applied Cryptography

Simple webserver

Solitaire

Solitaire

Sosemanuk

Spanish strip cipher (SSC)

Speck cipher

SPHINCS signature

SPHINCS+ signature

Square and multiply

Steganography

Open

Straddling checkerboard cipher

Substitution

Open

Substitution

Substitution cipher

Syllabary cipher

T-310

T9 code

TEA

Threefish

Tiger

Tiger MAC

TLS handshake

Tools

Open

Transcriptor

Transposition (double column transposition)

Transposition (double column transposition)

Transposition (single column transposition)

Open

Transposition

Trifid cipher

Triple-DES (3DES)

Triple-DES (3DES)

Trithemius

Open

Trivium

Trivium cipher

Twofish

Twofish

Twofish MAC

TwoTrack MAC

UU Decode/Encode

VCard

Verifiable secret sharing (VSS)

Vernam

Open

Vernam

VIC cipher

Vigenère

Open

Vigenère

Vigenère cipher

Open

Visual

codes (QR, EAN8, WAN13, Code39, Code128, PDF417)

Visual

cryptography

Vitányi

Viterbi

VSH

Watermark creator

Web terminal

Open

WEP

WEP

Whirlpool

Winternitz signature

Word pattern

X^2 (mod N) (

)

XOR

Open

Yao's millionaire problem (protocol) (

)

Zero knowledge protocol

Zip/Unzip

Zodiac-408

Zudo-Ku

Crypto function in CTTS: Cryptanalysis with Simulated Annealing