Cryptography app analytics for January 3

Cryptography

Cryptography

  • Nitramite
  • Google Play Store
  • Free
  • Tools
Unlock the World of Cryptography! Cryptography is your all-in-one toolkit for exploring, learning, and experimenting with encryption, ciphers, hashing, and encoding methods. Whether you're a beginner or an expert, this app offers a wide range of tools and resources for everyone. ⭐ Your Feedback Matters! Love the app? Rate us 5 stars! Have suggestions? Share your feedback to help us improve. Source code: https://github.com/norkator/cryptography Ciphers • Scytale cipher. • Polybius Square. • Atbash cipher. • Caesar cipher. • Rot 1 - 25 cipher. • Affine cipher. • Rail Fence cipher. • Keyword cipher. • Beaufort cipher. • Templar Cipher with image send feature. • Porta cipher. • Vigenere cipher. • Gronsfeld cipher. • Autokey cipher. • Bacon Cipher. • Chaocipher. • Adfgvx cipher. • Playfair cipher. • Two-Square cipher (currently encrypt). • Tri-Square cipher (currently encrypt). • Four-Square cipher (currently encrypt). • One-time pad. • BIFID cipher. • Trifid cipher. • Hill Cipher with editable Matrix. • Visual Cryptography. • Enigma cipher with saveable settings. • RSA cipher with custom keys • Blowfish cipher • Twofish cipher (next gen Blowfish) • Threefish cipher • Rijndael (AES) cipher • SCrypt (Password-based key derivation function, in progress) • Elliptic Curve Diffie-helleman AES, similar to Curve25519 • ChaCha cipher (Salsa20) • Cast5 • Cast6 • Shacal2 • Shamir's Secret Sharing (SSS) algorithm. • RC2 • RC4 • RC5 • RC6 • Triple DES • Serpent • SkipJack • ElGamal • Anubis. • Khazad. • IDEA. • ARIA. • Navajo. • Mary, Queen of Scots. .. and more! Hashes • Whirlpool 0 / 1 / W (hashing) • HMAC - SHA1 / SHA256 / SHA512 (advanced hashing) • Adler32 (hashing) • CRC - 8 / 16 / 24 / 64 (hashing) • ELF-32 (hashing) • FCS-16 (hashing) • HAS-160 (hashing) • MD-2/4/5 (hashing) • RIPEMD - 128 / 160 / 256 / 320 (hashing) • SHA - 0 / 1 / 2-224 / 2-256 / 2-384 / 2-512 / 3-224 / 3-256 / 3-384 / 3-512 (hashing) • Shake 128 / Shake 256 • Tiger - T / T2 / 128 / 160 (hashing) • Sum - 8 / 16 (hashing) • Xor8 (hashing) • GOST (hashing) • BCrypt (hashing) • PBKDF2 (hashing) with java|php example. • SipHash hashing algorithm. • Skein hash. • Keccak hash. • Argon2 hash. (remote api) • Blake2b • SM3 hash. • Kupyna | DSTU7564. Encodings • Base16 (same as Hexadecimal) • Base32 • Base58 • Base64 • Base85 | Ascii85 • Base91 • Morse code encoder with sound playback. Sound may be annoying. • Braille • Semaphore • Tap Code • ASL (American Sign Language) • Pigpen • Elian Script • Betamaze • A1Z26 • T9 • RLE - Run-length encoding • Webdings and Wingdings. • Pig Latin. Post-Quantum • NTRU Tools • Unknown cipher tool. • WhatsApp message decipher tool. • Anagram solver tool. • Password generator tool. • Checksum tool for text and files. • Custom Hmac SHA 1/256 + SHA256 password authentication digest creator tool. (java|php examples) • File Encryption Tool. Read tutorial from links which are included in explanation view or in tool question mark. • Hash Cracker resources. • Password Strength checker tool. • Frequency Analysis. • ASCII table (8-bit/255) with search function. • Binary, Hexadecimal, Decimal and Octal table with search function. • Text <> Binary converter. • Decimal <> Binary converter. • Hexadecimal <> Binary converter. • Integer(number) <> Binary converter. • Hex <> Ascii converter. • Pseudo Random Number Generator (PRNG) with explanation. • AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases. • Steganography, encrypt decrypt tool in build. • ASCII Font Art tool. • Normal QR Code generator. • Normal QR code reader (camera or image) • Nato phonetic alphabet. Algorithms • Blum Blum Shub generator. • Haversine formula. Links Contact: http://www.nitramite.com/contact.html Eula: http://www.nitramite.com/eula.html Privacy: http://www.nitramite.com/privacy-policy.html
Cryptography

Cryptography Usage Rank

The usage rank is based on Similarweb's algorithm that calculates current installs and active users over a 28-day period.

All Categories in
United States--
Tools in
United States--

Daily active users

Analyze usage patterns of Cryptography users by viewing Cryptography downloads and daily active users over time.

Users

Analyze usage patterns of Cryptography users by viewing Cryptography downloads and daily active users over time.

Unlock daily active users
NovDecJan

Cryptography Ranking Stats Over Time

Similarweb's Usage Rank & Google Play Store Rank for Cryptography

Usage Rank

Rank

Cryptography Ranking by Country

Counties in which Cryptography has the highest ranking in its main categories


Users Interests & Top Categories

Top categories and apps used by Cryptography users

Top categories
Affinity
Top apps within the category
36%
Genius Scan Enterprise
BD File Manager File Explorer
Easy Voice Recorder Pro
ChatOn - AI Chat Bot Assistant
16%
AppLock
VPN - Super Unlimited Proxy
Calculator
Clock
11%
Invoice Maker, Invoices Manage
9%
Banca Móvil BCP

Top Competitors & Alternative Apps

Apps with a high probability of being used by the same users, from the same store.

CompTIA® Security+ Prep 2024

CompTIA® Security+ Prep 2024

Pass Your Exam

Bitdefender Central

Bitdefender Central

Bitdefender

Exact Synergy

Exact Synergy

Exact

Learn Computer Networking Pro

Learn Computer Networking Pro

Karim Code Studio

Cryptography VS.

January 3, 2025