TSM Inc.

Company Homepage: http://www.crypto-central.com/

Send e-mail to this Company

Design, explore and maintain databases, build compound SQL query statements, manage database user rights, and manipulate data fast and convenient.

Company Products

Total 8 products

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the popular and fast 'Blowfish' algorithm by Bruce Schneier. Blowfish is royalty free and does not have any known weaknesses. The algorithm is royalty free. Features: ECB, CBC, CFB and OFB modes of operation Automatically handles all padding of the input High- …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 926 kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

The original RSA algorithm conveniently packaged as a Delphi component. The RSA component has been a long time in the making, but we hope that you will find that it meets the promises we have made for it. Features: Supports 512, 1024 and 2048 bit keys Compatibility to standard RSA keys (example …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 773 kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

Components > Security > Shareware

By TSM Inc..

Commercial 05 Sep 2006

Description

SLockPK uses the power of public key encryption to protect your software. Recognized by experts as the only secure way to protect software, public key crypto provides a level of security higher than hardware dongles, but using only software. Features: Public key encryption (RSA) for highest …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • price: $89
  • Source price: $249
  • Size: 2 341 kB

Platforms: CB4, CB5, CB6, D5, D6, D7

Components > Security > Crypting

By TSM Inc..

Freeware 04 Jan 1999

Description

Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 779 kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

Applications in Delphi and BCB > Internet > Mail

By TSM Inc..

Shareware 02 Aug 1999

Description

DataMail allows you to quickly and easily create a mail distribution using a similar method to the "MailMerge" function in Microsoft Word. Where the Word MailMerge allows you to create printed letters, DataMail lets you do the same for eMail, meaning you can stay in contact with a large number of …

Informations

  • Status: Evaluation (time-limit)
  • Source: N/A
  • price: $20
  • Size: 368 kB

Platforms: NT4, W2K, W95, W98,

Applications in Delphi and BCB > Security > Passwords

By TSM Inc..

Freeware 21 Sep 1998

Description

Password Guardian keeps track of your passwords. Password Guardian uses Blowfish encryption which has stood the test of time and has proved itself to be reliable. There are no known methods of breaking Blowfish encryption, an important point as many will have heard by now that DES (Data Encryption …

Informations

  • Status: Fully functional
  • Source: None
  • Size: 218 kB

Platforms: NT4, W2K, W95, W98,

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of Elliptic Curve public key encryption. Elliptic Curves offer the best public key security with the smallest possible key length. The elliptic curve problem is considered to be significantly harder to solve than RSA, and can therefore offer a comparable level of strength in …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 503 kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

Components > Security > Crypting

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today. Features: 160 bit hash length Offers high- …

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 728 kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6