apaWAP secure
An online text encryption system. To code, write the message, press the button [Encode], copy the link (normally through the keys [Control] + [C]), and paste the link where you want (for example inside the text of an email).
Asier Technology Cryptography
Creators of an ultra large key cryptographic algorithms. The key space ranges from 37,000 to 136,000 bits.
Cryptico, Rethinking Encryption
Web site of Danish company that invented a new encryption algorithm based on the principles of mathematical chaos.
MAG Random Number Algorithm
MAG is an algorithm (cellular automata) that creates an apparently random stream of numbers. It is very simple and very fast.There are arguments that the MAG algorithm can be easily transformed in the NP class of problems which enables a complexity-theoretic approach to cipher design using MAG.
MAK Coder
Encode and decode data with XOR password and base64 resulting in nominal security.
NE2 - Simply Secure Communications
Solutions for security, performance, and management of wireless and wired network communications.
PGP Mimic
Lets you generate message that look like PGP... but aren't.
Practical One Time Pad
This system is designed for the requirements of the undercover agents working in foreign countries, but may be extended to be used for the personnel of embassies and consulates. Instead of exchanging messy OTP's, some neatly prepared simple and short tables are exchanged by the teams.
SC128 block cipher
SC128 is a new block cipher whose design is quite original. It is very efficient in all environments, and is fast in software (6.5 cycles per byte with MMX instructions). The site contains a PDF document, a source code, and a sample of statistical tests (ENT & NIST).
The Polymorphic Cipher
A cryptosystem based on randomizing the encryption algorithm.
Warlock Cipher
Warlock is a stream cipher that uses a key as long or longer then the plain text, where the key is derived from the Password and SHA-512 recursion) to cipher the data, followed by a Clear-Text transform to disguise the encrypted data from triggering any suspicion.