Save 10% ordering this product in discounts:

Create feature-rich windows applications with many new components and universal dialogs.

  • improved DBGrid
  • new DBRecordView, DBTreeView
  • toolbars and db dialogs to Find, Filter, Sort, Export, Print...
  • StringGrid with columns definition
  • GroupBox with automatic alignment and resizing of owned controls

And many more from $25 to $95 only - click for details!

1Crypt v.1.1

By Atma Software.

Shareware 05 Sep 2006

Description

A quick and professional way to add strong encryption to your application. 1Crypt is a function library (DLL) which allows you to easily and securely encrypt files, strings, and buffers using 256-bit Advanced Encryption Standard (Rijndael) encryption. Using strong encryption in your application doesn't have to be complicated.

Informations

  • Status: Partially restricted
  • Source: None
  • price: $19
  • Exe demo: included
  • Size: 604kB

Platforms: C2k6, CB1, CB3, CB4, CB5, CB6, D2, D2005, D2006, D3, D4, D5, D6, D7

SecureBlackbox Delphi v.12.0.258

By EldoS Corporation.

Commercial 22 Aug 2014

Description

SecureBlackbox (VCL edition) is the comprehensive component collection for Internet security.

SecureBlackbox is split to several packages:

  • PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you manage certificates, stored on CryptoCards and USB CryptoTokens, via CryptoAPI.
  • PGPBlackbox - clean-room implementation of all PGP algorithms and standards with support for operations with PGP keys and keyrings
  • PDFBlackbox - clean-room implementation of PDF compression, encryption and signing specifications. Public Key (X.509 certificates) and symmetric encryption is supported. PKCS#1 and PKCS#7 signing is supported.
  • SSLBlackbox - client and server components that provide complete support for SSL2, SSL3 and TLS1. Unlike other components SSLBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries.
  • MIMEBlackbox - high-quality MIME components with own character conversion tables and own MIME parser/assembler. MIMEBlackbox offers support for S/MIME and PGP/MIME too. DomainKeys technology is supported.
  • SSHBlackbox - client and server components that provide support for SSH1 and SSH2 (including compression) and don't depend on third-party libraries.
  • SFTPBlackbox - client and server components that provide support for Secure File Transfer Protocol (SFTP, SSH-based protocol).
  • FTPSBlackbox - client-side component, which implements FTP (RFC 959) and FTP-over-SSL (RFC 2228) protocols for secure file transfer.
  • Many more...

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • Size: 48 924kB

Platforms: C2k10, C2k7, C2k9, CBXE4, CBXE5, CBXE6, CBXE, CBXE2, CBXE3, D2005, D2006, D2007, D2009, D2010, D6, D7, DXE4, DXE5, DXE6, DXE, DXE2, DXE3

aecDES

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but has stood the test of time to show that the quickest attack on DES is to search the entire keyspace for the correct key. DES is the most thoroughly inspected block ciphers.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "bog08gG((ihiiH".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 739kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AecRijndael v.1.16

By TSM Inc..

Freeware 20 Jun 2001

Description

Delphi implementation of the new standard algorithm as chosen in the recent AES competition. Rijndael was chosen from a panel of 15 different algorithms from top crypto experts, and has received a large amount of attention from cryptoanalysts in recent months. As of now, this is our recommended algorithm for symmetric encryption. The algorithm is patent and royalty free.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for free installation is "vnsj289+4Sxfl4s04kjsp".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 1 380kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AecTwofish v.1.0

By TSM Inc..

Freeware 04 Jan 1999

Description

Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, nor never will be under any patent restrictions

Features:

  • Offers encryption using 128, 192 or 256-bit keys
  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "Vpz86f7IGvo8vp".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 779kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AES dll v.0.1

By LOCK Soluciones.

Freeware + source 28 Mar 2005

Description

This is an easy to use unit, that allows encrypting and decrypting files using the aes.dll, which implements the AES / Rijndael 128 bit cypher algorithm.

For beginner users, EncodeFile (secretkey, infile, outfile), and DecodeFile (secretkey, infile, outfile), are available for easy encryption/decryption.

For advanced users, the DLL API functions are declared in the interface section of the unit.

The DLL is not included, but can be downloaded and distributed free from the URL there.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 3kB

Platforms: D5

AesLib v.3.2

By J. Rathlev, D-24222 Schwentinental.

Freeware + source 21 Jan 2022

Description

AesLib.pas is a Delphi interface to the AES encryption routines from Brian Gladman.
  • Generating of a salt value
  • Password verification
  • Generating of authentication code
  • Encryption of a stream
  • Decryption of a stream.
  • 32 and 64 bit versions
The source code of a sample program is included.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 150kB

Platforms: D10, D10.1, D10.2, D10.3, D10.4, DXE2

AllLib: Cryptography

By Vlad Stepanov.

Shareware 29 Aug 2010

Description

Asymmetric cryptography using certified products.

Requires AllLib units.

Features:

  • Microsoft CryptoAPI RSA, RSA 128 bits (integrated in Windows) and Crypto-Pro GOST 28147-89, GOST R 34.11/34.10-94/2001 support (pure CryptoAPI calls; eToken, ruToken usage allowed by installing their drivers and configuring Crypto-PRO):
    • private and public key generation, requesting and installing certificates (not require XEnroll.dll etc.); issuing certificates by standard Microsoft Certification Authority; reading/viewing certificate, certificate request fields (from binary data or Base64), adding certificate to CryptoAPI store (can be viewed from IE);
    • asymmetric data (string, file or stream) encrypting and decrypting by keys or installed certificates, with ability of key caching; encrypting and decrypting with multiple receivers using certificates, verifying by Certification Authority certificate(s);
    • signing and sign verifying by keys or installed certificates with ability of key caching; certificate can be inserted into signature, verified by Certification Authority certificate(s), reading certificate or it fiels from signature.
  • Signal-COM Message-PRO RSA or SKZI GOST 28147-89, GOST R 34.11/34.10-94/2001 trial-version support (with eToken, ruToken PIN dialogs):
    • asymmetric data (string or file) encrypting and decrypting with ability of key caching;
    • signing and sign verifying with ability of key caching, certificate can be included into signature or not; ability to read certificate or it field from signature;
    • keys and certificate request generation by calling Admin-PKI (with no replacing 00000001.key for disk carrier medias); installing certificates (with switching to key corresponding to certificate (for disk carrier medias); reading/viewing certificate or certificate request fields; converting old SKZI Crypto-COM 3.0 keys to new SKZI Crypto-COM 3.1 format; password changing.
  • Miscellaneous encoding and cryptographic routines, licensing object (based on CPU/BIOS/HDD information reading from hardware, realized on AllLib), AllLib object to work with symmetric algorithms and CRC/hashing using streams/files/string; object to call CryptoAPI/Crypto-PRO or Signal-COM Message-PRO from same methods, signing/signature verifying dialogs etc.

Informations

  • Status: Partially restricted
  • Source: On request
  • Size: 1 039kB

Platforms: D5, D7

AMPRNG rev1.0 v.2010.07.23

By Alexander Myasnikov.

Freeware + source 23 Jul 2010

Description

AMPRNG (revision 1.0) - is simple, fast and probably secure pseudo-random number generator (byte-level, for software implementation) and symmetric stream cipher with 80-512 bit key and (optional) 80-512 bit initialization vector (IV).

Includes C and Delphi sources.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 10kB

Platforms: C2k10, C2k6, C2k7, C2k9, CB6, D2005, D2006, D2007, D2009, D2010, D7

blins Crypt v.0.1

By Oleg Karakin.

Freeware 14 Oct 2008

Description

Crypting components, works with libmcrypt.

Encrypt/Decrypt string, stream, dataset string fields.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 733kB

Platforms: D2005, D2006

Cartman block cipher 1.2 mK v.1.2mK

By Alexander Myasnikov.

Freeware + source 03 Mar 2009

Description

Full source code of Cartman block cipher implementation. Cartman-1.2mK encrypts 128 bit block with 256 or 512 bit key.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 4kB

Platforms: C2k6, C2k7, CB4, CB5, CB6

Cartman block cipher 2.DDP.5 v.2.DDP.5

By Alexander Myasnikov.

Freeware + source 03 Mar 2009

Description

Full source code of Cartman block cipher implementation. Cartman-2.DDP.5 encrypts 128 bit block with 256 or 512 bit key.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 56kB

Platforms: C2k6, C2k7, CB3, CB4, CB5, CB6

Cartman-2P block cipher v.2.P

By Alexander Myasnikov.

Freeware + source 03 Mar 2009

Description

Full source code of Cartman block cipher implementation. Cartman-2P encrypts 128 bit block with 384, 512 or 640 bit key. This is alternative version with 8x8 256-byte S-box tables and data-dependent permutation technique (DDP). Includes unique key-dependent operations technology enabled transformation rounds . Cipher inludes new round fuctions, has new structure, not used in Cartman family before this edition.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 56kB

Platforms: C2k6, C2k7, CB3, CB4, CB5, CB6

Cosmos Encryption Component v.0.01b

By Sercan Oz, Suat Alper Seyhan.

Commercial 15 Jul 2008

Description

Cosmos is a powerful 256-bit encryption system that you can encrypt texts in a file. You can use this encryption system for multiple uses. For example you can use Cosmos Engine for creating Log-in and access control dialogs for your applications.Cosmos is a dll based component which you can use with any programming language. You can call procedures and functions of Cosmos from the any programming environment that you design your application.

Demo includes a application which can be used as a Log-in dialog which stores encrypted passwords in a file called "password.dat" in an apllication directory.

Informations

  • Status: Demo only
  • Source: On purchase/registration
  • price: $9
  • Source price: $250
  • Size: 275kB

Platforms: D2007

CryptLib

By Duff Neill.

Freeware + source 04 Aug 1998

Description

Contains several Advanced Encryption Standard Canidate encryption algorithms in pure Object Pascal.

Informations

  • Status: Fully functional
  • Source: Included
  • Exe demo: included
  • Size: 170kB

Platforms: D3

Crypto v.1.0

By WINSOFT spol. s r.o..

Shareware 19 Nov 2022

Description

Delphi and C++ Builder cryptography library.
  • uses standard Windows CNG API
  • available for Delphi/C++ Builder 7 - 11.2
  • source code included in registered version
  • royalty free distribution in applications

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $120
  • Size: 2 135kB

Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, C11.1, C2k10, C2k6, C2k7, C2k9, CB64, CBXE, CBXE2, CBXE3, CBXE4, CBXE5, CBXE6, CBXE7, CBXE8, D10, D10.1, D10.2, D10.3, D10.4, D11, D11.1, D2005, D2006, D2007, D2009, D2010, D7, DXE, DXE2, DXE3, DXE4, DXE5, DXE6, DXE64, DXE7, DXE8, FM, FM2, FM3

Crypto for Android v.1.0

By WINSOFT spol. s r.o..

Shareware 05 Oct 2022

Description

Delphi and C++ Builder cryptography library for Android.
  • uses Android Cryptography APIs
  • available for Delphi/C++ Builder 10.4 - 11.2
  • source code included in registered version
  • royalty free distribution in applications

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $120
  • Size: 3 817kB

Platforms: C10.4, C11, C11.1, D10.4, D11, D11.1

Crypto Library v.1.0

By CRYPTOCard Corporation.

Freeware + source 11 Mar 1996

Description

Industrial Strength Encryption and Hashing routines for BP7 and Delphi compilers. If you need to protect data in your applications, then this is a good place to start. These are NOT the simple XOR routines found in most programming books. These are implementations of the best cryptographic algorithms available today.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 142kB

Platforms: D1, D2

DCPcrypt v.2.0 Beta 3

By Dave Barton.

Freeware + source 05 Sep 2006

Description

DCPcrypt is an open source library of cryptographic components (encryption and hash algorithms). The idea behind DCPcrypt is that it should be possible to "drop in" any algorithm implementation to replace another with minimum or no code changes.

Algorithms implemented include: Blowfish, Twofish, Cast-128, Cast-256, DES, 3DES, Ice, Thin Ice, Ice2, IDEA, Mars, Misty1, RC2, RC4, RC5, RC6, Rijndael (the new AES), Serpent, TEA, Haval, MD4, MD5, RipeMD-128, RipeMD-160,SHA-1, SHA-256, SHA-384, SHA-512, Tiger.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 197kB

Platforms: CB4, CB5, CB6, D2005, D4, D5, D6, D7

Delphi Encryption Compedium Part I v.3.0

By Hagen Reddmann.

Freeware + source 31 Aug 1999

Description

A Compendium of various strong Encryption Algorithm and more... includes:
  • 40 Ciphers (IDEA, Blowfish, Twofish, DES, Square ...)
  • 23 Hashs (MD4/5, SHA/1, RipeMD, Havel, Tiger ...)
  • 5 Checksums (CRC32, CRC16-CCITT, CRC16-Standard ...)
  • 6 Text formats (MIME Base 64, XX/UU Coding, RFC1760 Six Word ...)
  • 2 Randoms (LFSR Linear Feedback Shift Register with variable Period upto 2^2032-1 ...)
  • with Ciphers can be encrypt in Modes CTS/ CBC/ CFB/ OFB/ ECB
  • Ciphers supports Message Authentication Codes in CBC-MAC/ CFB-MAC/ CTS-MAC
  • fast Implementation (i.e. Blowfish > 8Mb/sec, MD4 > 27Mb/sec)
  • full and easy object oriented
  • High optimized Assembler Core
  • Designtime Components to managing Cipher- and Hash- classes
  • Message Authentication Codes for all Hash's (Internet RFC2104-HMAC's ...)
  • Internet RFC2289/RFC1760/RFC2444 One Time Password Routines as Component
  • Many more...

Informations

  • Status: Fully functional
  • Source: Included
  • Exe demo: included
  • Size: 678kB

Platforms: CB3, CB4, D2, D3, D4, D5

Fundamentals Cipher v.4.07

By Fundamentals Library.

Freeware + source 26 Aug 2011

Description

Fundamentals Cipher Library allows encryption, decryption using the following ciphers:
  • AES
  • DES
  • RC2
  • RC4
  • RSA

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 164kB

Platforms: D2005, D2006, D2007, D2009, D2010, D5, D6, D7, DXE

GPLib v.1.3.0.7

By Richen Software.

Freeware 26 Apr 2010

Description

GPLib - interfaced library (GPLib.dll), containing procedures and functions to (de)encryption and digital signature data in your programs.

Currently library supports:

  • Algorithms (symmetric) encryption: Blowfish, Twofish, IDEA, Cast 128, Cast 256, RC2 (Rivest), RC4 (Rivest), RC5 (Rivest), RC6 (Rivest), Rijndael (AES Winner), Square, SCOP, Sapphire, Gost, TEA, TEAN
  • Hash algorithms: MD4, MD5, SHA, SHA 256 bit, SHA 512 bit, Sapphire, RIPE MD 128 bit, RIPE MD 256 bit, Haval 128 Bit, Haval 256 Bit, Whirlpool, Square, Snefru 128 Bit, Snefru 256 Bit
  • Algorithms conversion: Hex, MIME Base 32, MIME Base 64, PGP with PGP-Checksum
  • Informations

    • Status: Fully functional
    • Source: None
    • Size: 156kB

    Platforms: D2006, D5, D6, D7

    GTEA Green TEA block cipher v.29.04.2009

    By Alexander Myasnikov.

    Freeware + source 30 Apr 2009

    Description

    GTEA (Green TEA) block cipher is based on ideas of popular TEA ciphers and new Cartman cipher family. Cipher has 128 bit block, uses by default 512 bit key, runs on 32 full cycles. Cipher has nice speed - over 26 MBytes/second on AMD x2 3600 (Intel C compiled version).

    Speed is not key-dependent, key can be from 256 to 4096 bit, long keys makes better round subkeys.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 272kB

    Platforms: C2k6, C2k7, CB3, CB4, CB5, CB6

    HashCart-XT v.2010.07.27

    By Alexander Myasnikov.

    Freeware + source 27 Jul 2010

    Description

    HashCart-XT is the secure hash function with 128 bit digest output, based on XTEA-3 block cipher as compression routine. Includes sample code for hashing binary file, block and string.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 2kB

    Platforms: C2k10, C2k6, C2k7, C2k9

    Hurricane cipher v.1.0

    By Roman Ganin.

    Freeware 04 Jan 2005

    Description

    Hurricane is the algorithm wich provides the strong 128 (and more) bit data encryption even better than such fammous algorithms as DES, AES (Rijndael), 3DES, Twofish and others, and much more faster. This implementation is easy to understand and it can be used to create file- or socket-relayed secure applications. The demo is included.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 18kB

    Platforms: D1, D2, D3, D4, D5, D6, D7

    KA Steganography Image v.3.0

    By Kiril Antonov.

    Freeware + source 24 Apr 2007

    Description

    TKASteganographyImage component provides basic Steganography features of embeding text and binary data in a bitmap image.
    • Only windows bitmaps (*.bmp) are supported
    • Bitmap size is not altered so empty image and image containing data have same size.
    • Each LSB bit in the RGB triple of the bitmap contains embedded data so human eye cannot find the difference between empty image and image containing data.
    • Data is password protected.
    • Long passwords gives better protection of the data.
    • Embedding large files allowed via usage of multiple images
    WARNING: If you forget the password used to embed the data, data cannont be recovered in any way, becouse password is used as a base to encrypt the message XOR-ing password and the embedded data.

    Version 3.0 is not compatible with the previous versions of KASteganographyImage.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 375kB

    Platforms: D2005, D2006, D2007, D7

    LockBox v.3.2.0

    By Turbo Power Software.

    Freeware + source 19 Apr 2011

    Description

    LockBox 3 is a Delphi library for cryptography. Currently supported compilers include Delphi 2007 and Delphi 2010. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and more...

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 2 359kB

    Platforms: D2007, D2010

    LZCipher v.1.0

    By Miguel Andrade.

    Freeware + source 01 Apr 2007

    Description

    String encryption and decryption routines

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 2kB

    Platforms: C2k6, CB1, CB3, CB4, CB5, CB6, D2005, D2006, D2007, D4, D5, D6, D7

    MD5

    By Dimka Maslov.

    Freeware + source 29 Aug 2002

    Description

    The MD5 hashsum evaluation unit.

    This unit is a translation of the RSA Data Security, Inc. MD5 Message-Digest Algorithm described in RFC 1321. The unit contains functions to evaluate MD5 hashsum of a string, a file, a stream or any memory buffer, to convert a hashsum evaluation function result into a string of hexadecimal digits and to compare results of two evaluations.

    No other files nor dynamic libraries are required to compile and use this unit.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 4kB

    Platforms: D5, D6

    MD5-Karn rev1.0

    By Alexander Myasnikov.

    Freeware + source 14 Jun 2010

    Description

    Karn-MD5 - Karn encryption cipher, symmetric block cipher based on hash function (MD5). Key size is 768 bit, block size is 256 bit.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 7kB

    Platforms: C2k10, C2k6, C2k7, C2k9

    MPC Coder v.2.0

    By MPC.

    Freeware + source 30 Nov 2006

    Description

    MPC Coder - component used crypt algorytm by MPC.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 325kB

    Platforms: D1, D2, D3, D4, D5, D6, D7

    Opensource strong ciphers pack v.2010.1

    By Alexander Myasnikov.

    GPLS 21 May 2010

    Description

    Opensource strong ciphers pack - collection of 19 Russian block ciphers and one stream cipher (cryptographic PRNG). All source codes are ready to use in application and were passed statical tests with nice results.

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 424kB

    Platforms: C2k6, C2k7, CB6, D2005, D2006, D2007, D6, D7

    Optimized XTEA and VMPC ciphers v.0.1

    By Alexander Myasnikov.

    Freeware + source 13 Feb 2009

    Description

    Full source code of optimized XTEA implementation (fixed edition with more nice shifts and rounds) and VMPC stream cipher (strong version of RC4).

    Informations

    • Status: Fully functional
    • Source: Included
    • Size: 1kB

    Platforms: C2k6, C2k7, CB3, CB4, CB5, CB6

    PBRSA

    By PyBridge.

    Commercial 18 Aug 2022

    Description

    Component for working with RSA cryptosystem.
      Get the most recent Trial version:
        https://pybridge.net/DownloadTrial.php?product_name=PBRSA
      Enjoyed the Trial? -> unlock all functions in the full version:
        https://pybridge.net/product/pbrsa/

      Informations

      • Status: Trial (work while IDE is running)
      • Source: None
      • price: $90
      • Size: 4 917kB

      Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, C11.1, D10, D10.1, D10.2, D10.3, D10.4, D11, D11.1

      PC1 Encryption Algorithm for Delphi v.1.0

      By Alexander Pukall.

      Freeware + source 24 Feb 2003

      Description

      The source code for the PC1 encryption algorithm in Delphi, C, C++.

      The PC1 algorithm is a stream cipher secure against linear and differential cryptanalysis. You can use 128 or 256 bits keys.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 108kB

      Platforms: D2, D3, D4, D5, D6, D7

      PRGCrypto v.1.07

      By PRGSoftware.

      Shareware 04 Dec 2002

      Description

      The PRGCrypto Delphi component allows you to add strong cryptography to your application. This component is different from most other development libraries in that it is written in Delphi Object Pascal code and is full featured. There are no DLL's to tote around. This component links right into your application's executable. It is very easy to use.

      Informations

      • Status: Trial (work while IDE is running)
      • Source: On purchase/registration
      • price: $19.95
      • Source price: $49.95
      • Size: 73kB

      Platforms: D3, D4, D5, D6

      SEAL 3.0 rev 1.0

      By Alexander Myasnikov.

      Freeware + source 14 Jun 2010

      Description

      SEAL 3.0 - fastest symmetric stream cipher, very useful in software implementation. Here is my simple-to-read implementation of this cipher (key size 160 bit) in C and Delphi.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 6kB

      Platforms: C2k10, C2k6, C2k7, C2k9, D2005, D2006, D2007, D2009, D2010, D7

      Skipjack Encryption Algorithm Implementation

      By Dave Barton.

      Freeware + source 22 Sep 1998

      Description

      A block cipher for the clipper chip program. 64bit blocksize, 80bit keysize. This implementation was developed totally outside of the USA and so it is free from export restrictions.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 10kB

      Platforms: D1, D2, D3, D4

      StreamFilters v.1.0

      By Cintra Software Engineering AS.

      Freeware + source 01 Jul 1999

      Description

      Contains stream wrapper classes that allows the programmer to encrypt and decrypt streams with the encryption algorithms IDEA, Blowfish, RC5 and RC6, calculate checksums on streams with the algorithms 8, 16 and 32-bit byte-sum, CRC16 and CRC32, SHA-1 and MD5 (the last two are message digests), zLib compression (dll) and decompression on streams, persistent storage and streams, and Zip creation/reading (through zlib dll).

      Classes are built as new TStream descendant classes and can thus be used wherever normal streams can be used. They wrap around existing classes so that you can use them with whatever TStream descendant classes you might already be used.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 90kB

      Platforms: D3, D4

      StreamSec Tools v.3.0

      By StreamSec.

      Shareware 01 Nov 2005

      Description

      StreamSec Tools 3.0 is a complete rewrite of the entire StreamSec Tools code base, and does not share a single unit with StreamSec Tools 2.1. You can have StreamSec Tools 2.1 installed together with any of the StreamSec Tools 3.0 products.

      StreamSec Tools 2.1 was in some sense was a "too" comprehensive tool set. It contained everything from basic symmetric encryption to complex protocols such as SSL/TLS. Most customers were really only looking for a single security feature, and consequently they (a) paid for features they didn't really need and (b) had a hard time finding their way in the tool set. It also became increasingly hard to extend, since modularity and code size had not been design goals from the start.

      For this reason, StreamSec Tools 3.0 is a complete rewrite with a modular architecture that both allows us to sell just parts of it to fit specific customer demands, and allows us to extend it with new features without cluttering the API for every user each time we do so.

      Informations

      • Status: Trial (work while IDE is running)
      • Source: On purchase/registration
      • price: $599
      • Size: 4 010kB

      Platforms: D2006, D5, D6, D7, D2005

      TDM5 v.1.0

      By Alexey Chubar.

      Freeware + source 09 Sep 1999

      Description

      Component which perform data hashing with MD5 (Message-digest) algorithm.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 5kB

      Platforms: CB3, CB4

      TForge v.0.73

      By Sergey Kasandrov.

      Freeware + source 27 Nov 2015

      Description

      TForge is a modern cryptographic library for Delphi and Lazarus/FPC implemented as a set of runtime packages.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 432kB

      Platforms: D10, D2009, D2010, DXE, DXE2, DXE3, DXE4, DXE5, DXE6, DXE7, DXE8

      Threefish-512 block cipher v.0.3

      By Alexander Myasnikov.

      Freeware + source 17 Feb 2009

      Description

      Threefish is tweakable block encryption algorithm designed by Bruce Schneier, Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, and Jesse Walker. Threefish-512 has 512 bit key, 512 bit block and 72 rounds.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 3kB

      Platforms: C2k6, C2k7, CB4, CB5, CB6

      TMD5

      By TSM Inc..

      Freeware 05 Sep 2006

      Description

      Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today.

      Features:

      • 160 bit hash length
      • Offers high-level functions for producing the hash of a string, file or stream
      • Full native Delphi source code included in Corporate (with source) version.
      Installation password is "JHHJGJudzfugUG5".

      Informations

      • Status: Fully functional
      • Source: On purchase/registration
      • Source price: $99
      • Size: 728kB

      Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

      TMS Cryptography Pack v2.1.0.0

      By TMS Software.

      Shareware 10 Nov 2016

      Description

      TMS Cryptography Pack contains strong and up to date algorithms to perform most cryptographic operations. It includes algorithms to encrypt/decrypt, sign/verify, hash and authenticate data and files. The list of algorithm includes:
      • AES (all standard modes and key sizes) to encrypt and decrypt according to FIPS 197
      • AES MAC to authenticate data
      • AES Galois Counter Mode to authenticate data according to NIST SP 800-30D
      • Speck to encrypt and decrypt with low power chips
      • RSA (OAEP and PSS) to sign and verify signatures of data with key size up to 4096 bits or to encrypt and decrypt (used to exchange keys)
      • EdDSA to sign and verify signatures with Edwards elliptic curves
      • ECIES to encrypt and decrypt with elliptic curves, the AES and SHA2 (used to exchange keys)
      • Salsa20 to encrypt and decrypt data
      • SHA 2 to generate hashes according to FIPS 180-4
      • SHA 3 to generate hashes according to draft FIPS 202
      • RIPEMD-160 to generates hashes (e.g., for blockchain/bitcoin compatibility)
      • Blake2 to generate hashes and support Argon2
      • PBKDF2 to derive keys from passwords according to PKCS #
      • Argon2 to derive keys from passwords, winner of the Password Hashing Competition
      • Support functions to code/decode various standard formats (e.g., Base64)
      TMS Cryptography Pack contains class wrappers for the supported cryptography functions and various demos. The registered version comes with full source code of the class wrappers to cryptography functions provided in binary format. TMS Cryptography Pack can be used in VCL Windows 32/64 and FMX Windows 32/64, OS X, iOS32, iOS64 and Android apps.

      Informations

      • Status: Fully functional
      • Source: On purchase/registration
      • price: $91.28
      • Source price: $91.28
      • Size: 3 665kB

      Platforms: C10.1, D10.1, CBXE2, DXE2, CBXE3, DXE3, CBXE4, DXE4, CBXE5, DXE5, CBXE6, DXE6, CBXE7, DXE7, CBXE8, DXE8, C10, D10

      TSecHash v.0.03

      By Frank Kroeger.

      Freeware + source 09 Jun 1998

      Description

      A component to generate a condensed representation of a message called message digest using the Secure Hash Standard-1 (SHA-1). SHA-1 has been developed by the NIST (National Institut of Standards and Technology) and been published in FIP-180 (Federal Information Processing Standards Publication 180). SHA-1 produces a 160-Bit output (the message digest) of a message or a data file. SHA-1 is called secure because it is computationally infeasible to find a message corresponding to a given message digest or to find a second (different) message which produces the same message digest.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 8kB

      Platforms: D3

      TWOPES v.1.0

      By Alexander Myasnikov.

      Freeware + source 07 Feb 2009

      Description

      TwoPES - my ideas on improving PES (Proposed Encryption Standard) by extending key to 256 bit and using 16 rounds.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 4kB

      Platforms: C2k6, C2k7, CB5, CB6

      UnixCrypt v.1.2.2

      By UtilMind Solutions.

      Shareware 25 Apr 2006

      Description

      The UnixCrypt component is the ultra fast crypt implementation for Delphi/C++ Builder. It works exactly as crypt(key, salt) Unix comand (one-way encryption algorithm), which used to encrypt passwords in .htpasswd files in password protected Web directories.

      Informations

      • Status: With Nag-Screen
      • Source: On purchase/registration
      • price: $9
      • Source price: $17
      • Size: 228kB

      Platforms: C2k6, CB1, CB3, CB4, CB5, CB6, D1, D2, D2005, D2006, D3, D4, D5, D6, D7

      wodCrypt ActiveX Component v.2.2.2

      By WeOnlyDo Software.

      Shareware 18 Apr 2015

      Description

      wodCrypt is a lightweight component that provides strong encryption for your applications. It provides support for most common crypto algorithms, such as:
      • AES
      • DES, TripleDES
      • Blowfish
      • Cast
      • RC2
      • RC4
      • RC5
      • UNIX crypt command
      for symmetric encryption and decryption,
      • RSA
      • DSA
      for making and verifying signatures, and
      • MD5
      • SHA1
      for creating hashes.

      Informations

      • Status: Evaluation (time-limit)
      • Source: On purchase/registration
      • price: $139
      • Size: 4 548kB

      Platforms: C2k10, C2k6, C2k7, C2k9, CB1, CB3, CB4, CB5, CB6, CB64, CBXE, CBXE2, CBXE3, CBXE4, CBXE5, CBXE6, CBXE7, CBXE8, D2005, D2006, D2007, D2009, D2010, D3, D4, D5, D6, D7, DXE, DXE2, DXE3, DXE4, DXE5, DXE6, DXE64, DXE7, DXE8

      XTEA-1 v.2009

      By Alexander Myasnikov.

      Freeware + source 28 Feb 2009

      Description

      My optimized implementation of XTEA-1 block cipher by Tom St Denis (128 bit key, 64 bit block). XTEA-1 is more secure edition of TEA block cipher with large block and large key.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 1kB

      Platforms: C2k6, C2k7, CB3, CB4, CB5, CB6

      XTEA-3 block cipher v.0.1

      By Alexander Myasnikov.

      Freeware + source 31 Jan 2009

      Description

      My implementation of XTEA-3 block cipher by Tom St Denis (256 bit key, 128 bit block). XTEA-3 is more secure edition of TEA block cipher with large block and large key.

      Informations

      • Status: Fully functional
      • Source: Included
      • Size: 5kB

      Platforms: C2k6, C2k7, C2k9, CB5, CB6, D2005, D2006, D2007, D2009, D3, D4, D5, D6, D7