libObfuscate 2.00
ISO C / open-source / system independent

* Modern 256bit cryptography: AES, Anubis, Camellia, Cast-256, Clefia, FROG, Hierocrypt3, Idea-NXT, MARS, RC6, Safer+, SC2000, Serpent, Speed, Twofish, Unicorn-A, Wrapper
* CSPRNG (based on AES)
* Modern 512bit hashing: Grostl, Keccak, SHA2, Skein, Wrapper
* Scrambling
* Multi-layered obfuscation

Download in here :
Read more in here :

EPG – Extended Password Generator V2.0 released

EPG – Extended Password Generator is an unique tool which can help you to generate pronounceable and random passwords, secure against brute-force dictionary attacks.

Recen releasead Changes in 2.0: – Implemented checking user’s provided passwords – No more MFC, 100% written with ATL/WTL (including Grid, Clipboard, printing, etc) – Visual Studio 2010 – WTL 8.1 – Boost 1.49

This algorithm was initially suggested by National Technical Information Service (NTIS), developed at Federal Information Processing Standard (FIPS) No181 “Automated Password Generator” and modified by me to implement exclude/include scheme

Platform : Windows
Download :
Read more in here :

xca – X Certificate and Key management

X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations.

Features :

  • Start your own PKI and create all kinds of certificates, requests or CRLs
  • Manage your Smart-Cards via PKCS#11 interface
  • Export certificates and requests to a OpenSSL config file
  • Create name and/or extension templates to ease issuing similar certs
  • Convert existing certificates or requests to templates
  • Supports v3 extensions as flexible as OpenSSL but user friendlier

Download latest :  setup_xca-0.9.3.exe (6.4 MB)
Find Other Version |
Read more in here :

Security Analysis of a PUF based RFID Authentication Protocol

Abstract: In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim that this protocol does not provide any security. We present an efficient secret disclosure attack which retrieves all secret parameters of the protocol. Given those secret parameters, it would be trivial to apply any other attack in the context on the protocol. However, to highlight other weaknesses of the protocol we present extra reader traceability, impersonation and desynchronization attacks that do not require disclosing the secret parameters necessarily. Success probability of all mentioned attacks is almost “1” while the complexity is at most two runs of protocol.

Category : cryptographic protocols / RFID, Authentication, PUF, Traceability Attack, Reader Impersonation Attack, Tag impersonation Attack, Desynchronization Attack

Download this Papers