File Edit View Encrypt/Decrypt Digital Signatures/PKI Indiv. Procedures Analysis Options Window Help New Undo Toolbar Symmetric (classic) PKI Hash Tools for Analysis Plot Options... Cascade Starting Page Open... Redo Status Bar Caesar / Rot-13... Generate/Import Keys... MD2 Entropy Analysis Options... Tile Index Close Cut Show as Text Vigenère... Display/Export Keys... MD4 Floating Frequency Text Options... Arrange Icons Scenarios (Tutorials) Save Copy Show as HexDump Hill... Sign Document... MD5 Histogram Starting Options... Close All Readme Save as... Paste Bar Chart Substitution / ... Verify Signature... SHA N-Gram... CT Book Document Properties... Delete Alphabet Playfair... Extract Signature SHA-1 Autocorrelation Presentation Print... Find/Replace... End of Line ADFGVX... Signature Demonstration (Signature Generation)... SHA-256 Periodicity About CrypTool... Print Setup... Find Next Line Wrap Byte Addition... SHA-512 Symmetric (classic) Recent Files Select All Whitespace XOR... RIPEMD-160 -Only Exit Show ... Font Vernam / OTP... Hash Value of a File... Caesar Parent Window Arial 8 Homophone... Hash Demonstration... Vigenère Arial 10 Permutation / Transposition... Key Generation from Password (PKCS #5)... Vigenère (Analysis according to Schroedel)... Arial 12 Solitaire... Generation of HMACs... ADFGVX... Arial 14 / Rail Fence... RSA Substitution... Arial 16 Symmetric (modern) Prime Number Test... Solitaire... Arial 18 IDEA... Generate Prime Numbers... Byte Addition Arial 20 RC2... Factorization of a Number... XOR / Vernam Courier 8 RC4... RSA Demonstration... Known Plaintext Courier 10 DES (ECB)... Signature Demonstration (Signature Generation)... Hill... Courier 12 DES (CBC)... Lattice Based Attacks on RSA Single Column Transposition... Courier 14 Triple DES (ECB)... Factoring with a Hint... Manual Analysis Courier 16 Triple DES (CBC)... Attack on Stereotyped Messages... Substitution... Courier 18 AES (CBC)... Attack on Small Secret Keys... Playfair... Courier 20 Further Algorithms Protocols Solitaire... Format Text Document... MARS... Diffie-Hellman Demonstration... Symmetric Encryption (modern) Show Box (cube's borderlines) RC6... Network Authentication... IDEA... Serpent... Secure E-Mail with S/MIME... RC2... Twofish... Chinese Remainder Theorem Applications RC4... DESX... Astronomy and Planetary Motion... DES (ECB)... DESL... Modular Forward and Backward Transformation... DES (CBC)... DESXL... Secret Sharing by CRT... Triple DES (ECB)... AES (self extracting)... Visualization of Algorithms Triple DES (CBC)... Asymmetric Caesar... AES (CBC)... RSA Encryption... Vigenère... Further Algorithms RSA Decryption... Nihilist... MARS... RSA Demonstration... DES... RC6... Hybrid AES Serpent... RSA-AES Encryption... Rijndael Animation... Twofish... RSA-AES Decryption... Rijndael Inspector... DESX... ECC-AES Encryption... Rijndael Flow Visualization... DESL... ECC-AES Decryption... Enigma... DESXL... Secret Sharing Demonstration (Shamir)... Asymmetric Encryption Tools Factorization of a Number... Codes Lattice Based Attacks on RSA Base64 Encode/Decode Factoring with a Hint... Base64 Encode Attack on Stereotyped Messages... Base64 Decode Attack on Small Secret Keys... UU Encode/Decode Side-Channel Attack on "Textbook RSA"... UU Encode Hash UU Decode Attack on the Hash Value of the ... Decode ASN.1 of a Document Analyze Randomness Compress Frequency Test... Zip Poker Test... UnZip Runs Test... Generate Random Numbers... Serial Test... Password Quality Meter... FIPS PUB-140-1 Test Battery Password Entropy... Vitányi Length of a Number... 3D Visualization... Educational Games Number Shark Number Theory - Interactive Learning Tool for Number Theory... Point Addition on Elliptic Curves... Compute Mersenne Numbers... Generic t-adic NAF Key Generator...