Encrypt and decrypt both strings and binary data using various processing algorithms with the help of this Python encryption library
| Version | 9.5.0.86 |
| Updated | November 6 2023 |
| Developer |
Chilkat Software
N/A
N/A
|
| User Rating |
1094
2.3
|
| Original File Size | 4.7 MB |
| Downloads | 10133 |
| Systems | Windows All |
| Category | Programming |
Chilkat Python Encryption Library is an easy-to-use development component that provides support for encrypting and decrypting both strings and binary data.
The tool has been designed with support for symmetric encryption algorithms such as Rijndael, Blowfish, Twofish and can output the encrypted data in the form of Base64, quoted-printable, or hex-encoded strings. 256-bit encryption is supported.
Chilkat Python Encryption Library features a series of hashing functions aimed both at strings and binary data. It uses SHA1, SHA256, SHA384, SHA512, MD2, MD4, MD5, and HAVAL, while also providing support for RIPEMD128, RIPEMD160, RIPEMD256, and RIPEMD320. Additionally, the program offers BZIP2 compression algorithm and digital signature creation and verification.
With the help of this component, users can create and verify digital signatures and can pre-convert Unicode strings to ANSI and to any charset before encrypting. The application provides them with 256-bit encryption and with support for initialization vectors.
It can encrypt and decrypt entire strings or other type of data, while also providing support for DSA signatures. It enables you to set the public and private keys, then import and export the DSA keys.
Last but not least, Chilkat allows you to use the Diffie-Hellman algorithm to compute a shared secret.
muito obrigado pela crack
awesome! love it
Your email will not be published. Required fields are marked as *
AI-assisted software development is transforming the industry, but you already knew that
FEATURE Most customers don't need the biggest baddest models, just ones that work, are cheap, and won't pirate their proprietary data
Hundreds of layoffs, but this smells of geopolitics, not downsizing
Firefox maker warns old web tactics are now shaping AI at the expense of user choice
Six-hour breach turned trusted links into a coin toss between legit tools and credential stealers
Forget about investment value! Call it a 'strategic enabler for enterprise‑wide transformation,' says KPMG
Opinion Just what FOSS developers need - a flood of AI-discovered vulnerabilities