TSM Inc.
Company Homepage: http://www.crypto-central.com/
ALL VCL, WEB, FNC, FMX, LCL .NET and IntraWeb components + Business Tools & Developer Tools Stay always current with our entire product range at a fraction of the price!
- Access to new products upon release
- Access to premium support & updates for 1 year
- Access to previews and betas
- Perpetual licenses to all products
Total 10 products
AecBlowfish
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of the popular and fast 'Blowfish' algorithm by Bruce Schneier. Blowfish is royalty free and does not have any known weaknesses. The algorithm is royalty free.Features:
- ECB, CBC, CFB and OFB modes of operation
- Automatically handles all padding of the input
- High-level functions for encrypting strings, files, buffers and streams
- Additional mode for producing CBC-MACs (keyed hashes)
- Also includes support for base64 encoding and decoding strings
- Full native Delphi source code included in Corporate version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 926kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
aecDES
Components > Security > Crypting
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of the 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but has stood the test of time to show that the quickest attack on DES is to search the entire keyspace for the correct key. DES is the most thoroughly inspected block ciphers.Features:
- ECB, CBC, CFB and OFB modes of operation
- Automatically handles all padding of the input
- High-level functions for encrypting strings, files, buffers and streams
- Additional mode for producing CBC-MACs (keyed hashes)
- Also includes support for base64 encoding and decoding strings
- Full native Delphi source code included in Corporate version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 739kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
AecRijndael v.1.16
Components > Security > Crypting
By TSM Inc..
Freeware 20 Jun 2001Description
Delphi implementation of the new standard algorithm as chosen in the recent AES competition. Rijndael was chosen from a panel of 15 different algorithms from top crypto experts, and has received a large amount of attention from cryptoanalysts in recent months. As of now, this is our recommended algorithm for symmetric encryption. The algorithm is patent and royalty free.Features:
- ECB, CBC, CFB and OFB modes of operation
- Automatically handles all padding of the input
- High-level functions for encrypting strings, files, buffers and streams
- Additional mode for producing CBC-MACs (keyed hashes)
- Also includes support for base64 encoding and decoding strings
- Full native Delphi source code included in Corporate version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 1 380kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
AecRSA
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
The original RSA algorithm conveniently packaged as a Delphi component. The RSA component has been a long time in the making, but we hope that you will find that it meets the promises we have made for it.Features:
- Supports 512, 1024 and 2048 bit keys
- Compatibility to standard RSA keys (example program here)
- Fast implementation
- Performs Key Generation, Encryption, Decryption, Signing and verification
- Built in interface for linking with symmetric algorithms
- Easy to use interface.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 773kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
AecSLockPK Shareware Protection v.2.02i
Components > Security > Shareware
By TSM Inc..
Commercial 05 Sep 2006Description
SLockPK uses the power of public key encryption to protect your software. Recognized by experts as the only secure way to protect software, public key crypto provides a level of security higher than hardware dongles, but using only software.Features:
- Public key encryption (RSA) for highest security possible
- Cryptographic hashing (SHA-1) to lock license to your software
- Cryptographic hashing (SHA-1) to lock license to a single PC
- Protects against viruses and cracks
- Can use optional Internet server to make automatic registrations
- Delivers adverts (so the other 90% of downloads work for you)
- Advanced protection against tampering
- Licenses have an expiry date (software rental or re-registration)
- Licenses can be created for a single PC or a group of PCs
- Key generators are impossible
- Internet server can constantly monitor for cracks
- Internet server can inform you of downloads and registrations.
Informations
- Status: Fully functional
- Source: On purchase/registration
- price: $89
- Source price: $249
- Size: 2 341kB
Platforms: CB4, CB5, CB6, D5, D6, D7
AecTwofish v.1.0
Components > Security > Crypting
By TSM Inc..
Freeware 04 Jan 1999Description
Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, nor never will be under any patent restrictionsFeatures:
- Offers encryption using 128, 192 or 256-bit keys
- ECB, CBC, CFB and OFB modes of operation
- Automatically handles all padding of the input
- High-level functions for encrypting strings, files, buffers and streams
- Additional mode for producing CBC-MACs (keyed hashes)
- Also includes support for base64 encoding and decoding strings
- Full native Delphi source code included in Corporate version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 779kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
DataMail
Applications in Delphi and BCB > Internet > Mail
By TSM Inc..
02 Aug 1999Description
DataMail allows you to quickly and easily create a mail distribution using a similar method to the "MailMerge" function in Microsoft Word. Where the Word MailMerge allows you to create printed letters, DataMail lets you do the same for eMail, meaning you can stay in contact with a large number of contacts quickly and easily.DataMail is different from an internet mailing list in that you can selectively eMail your contacts and that you can change the text of the mail according to fields in a database. DataMail uses a connection to your mail server to send mails at up to speeds of 10k mails per hour. The speed is of course dependant on the speed of your internet connection and the speed of your mail server.
Informations
- Status: Evaluation (time-limit)
- Source: N/A
- price: $20
- Size: 368kB
Platforms: NT4, W2K, W95, W98,
Password Guardian
Applications in Delphi and BCB > Security > Passwords
By TSM Inc..
Freeware 21 Sep 1998Description
Password Guardian keeps track of your passwords. Password Guardian uses Blowfish encryption which has stood the test of time and has proved itself to be reliable. There are no known methods of breaking Blowfish encryption, an important point as many will have heard by now that DES (Data Encryption Standard) has been broken in the very recent past. Password Guardian also ensures that no passwords can be leaked out of the system: Passwords are only ever stored in encrypted form, only being decrypted in memory for display. After the passwords are used, they are destroyed by overwriting them (referred to as 'burning' them) before freeing the memory where they are stored.Informations
- Status: Fully functional
- Source: None
- Size: 218kB
Platforms: NT4, W2K, W95, W98,
TElliptic Curve
Components > Security > Crypting Other
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of Elliptic Curve public key encryption. Elliptic Curves offer the best public key security with the smallest possible key length. The elliptic curve problem is considered to be significantly harder to solve than RSA, and can therefore offer a comparable level of strength in much shorter bit lengths.Features:
- 160 bit keylength - roughly equivalent to 1024 bit RSA
- Very fast
- Performs Encryption, Decryption, Signing and verification
- Performs key generation for symmetric encryption
- Full native Delphi source code included in Corporate version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 503kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6
TMD5
Components > Security > Crypting
By TSM Inc..
Freeware 05 Sep 2006Description
Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today.Features:
- 160 bit hash length
- Offers high-level functions for producing the hash of a string, file or stream
- Full native Delphi source code included in Corporate (with source) version.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $99
- Size: 728kB
Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6