Transposition Cipher 2.0.1.2
Transposition Cipher is a free and reliable application which will allow the encryption and decryption of data using irregular columnar transposition.
|
Transposition Cipher is a free and reliable application which will allow the encryption and decryption of data using irregular columnar transposition.
The Key button permits settting of a numeric key which is one dimension of the transposition rectangle and this must be set before you can encrypt or decrypt data (the other dimension is calculated automatically).
Our implementation of this cipher can cope quite happily regardless of the ratio between the key and the data length, and will encrypt and decrypt data with a variable second dimension without difficulty.
Using the Open Plaintext or Open Ciphertext buttons on the tool bar, you may open a standard text (.txt) file or Transposition Cipher text (.tpc) file for processing. The size of the file in bytes, and the file name and path, are displayed on the status bar. Using the Close Plaintext or Close Ciphertext buttons, the data stores and displays are cleared.
The Encrypt and Decrypt buttons will allow processing of the source data after first stripping away any spaces, punctuation and numbers. Please note that you must load the source data into the correct pane. If you are encrypting, load the plaintext source into the upper pane. If decrypting, load the ciphertext source into the lower pane.
Print buttons are available to allow the printing of the contents of both the Plain and Cipher text panes.
Using the Save Plaintext or Save Ciphertext buttons on the tool bar, you may save pane contents to a standard text (.txt) file or Transposition Cipher text (.tpc) file, as appropriate.
There is no file size limit in Transposition Cipher although your operating system and memory configuration may impose such limits. Menu options include functions similar to the toolbar, along with various help options.
tags
transposition cipher cipher text ciphertext buttons load the into the using the text txt txt file tpc file source data source into the source the file

Download Transposition Cipher 2.0.1.2
Download Transposition Cipher 2.0.1.2
Similar software
Transposition Cipher 2.0.1.2
JBO Software
Transposition Cipher is a free and reliable application which will allow the encryption and decryption of data using irregular columnar transposition.
Vigenère Cipher 2.0.2.3
JBO Software
Vigenère Cipher is a free and reliable utility that will enable the encryption and decryption of data using polyalphabetic substitution.
I-Cipher AP 2.2.2
AMBITWARE
Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record every action.
HS Crypto C Source Library 1.0
Hillstone Software
HS Crypto is a useful and reliable software library in C (supplied with full source code) which offers a programmer an API to several data encryption / decryption algorithms.
Amethyst CIPHER 1.05
CA Design Associates Ltd.
Amethyst CIPHER is an application that helps you secure your sensitive data from prying eyes!
Amethyst CIPHER is a powerful file encryption program for Windows.
Caesar Shift Cipher 2.0.1.2
JBO Software
Caesar Shift Cipher is a useful program that will allow the encryption and decryption of data using any of the twenty-five possible monoalphabetic shift-substitution ciphers.
DP-MULTICRYPTER 1.6.01
Dirk Paehl
DP-Multicrypt is a reliable filecrypther application that comes with drag & drop support : Multicrypt might use the following ciphers: Blowfish, Cast256, IDEA, Mars, RC4, Twofish, RC6, Rijndael with the full keysize from this cipher and the CBC-MODE.
QuickCrypt Library 2.51
SlavaSoft Inc
A fast, highly optimized implementation of symmetric (private-key) encryption/decryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES - Advanced Encryption Standard), GOST (USSR/Russian Encryption Standard).
PrimaSoft Encryption - Service Edition 1.0
PrimaSoft PC Inc
PrimaSoft Encryption is a Windows program which allows you quickly and easely to run scheduled encryption and decryption sessions as a service process using the latest industry standard strong encryption algorithms: AES (US Advanced Encryption Standard, secret-key encryption also known as Rijndael); Twofish (secret-key encryption); RSA (public-key encryption)
Features:
· Encryption software: service process: You can run scheduled auto-recurring encryption and decryption sessions as a service process.
Strong File Encryption/Decryption 1.0
PrimaSoft PC
Strong File Encryption/Decryption can be used at encrypting and decrypting
files or folders.