Cryptography App-Analysen für 17. März

Cryptography

Cryptography

  • Nitramite
  • Google Play Store
  • Kostenlos
  • Tools
Unlock the World of Cryptography! Cryptography is your all-in-one toolkit for exploring, learning, and experimenting with encryption, ciphers, hashing, and encoding methods. Whether you're a beginner or an expert, this app offers a wide range of tools and resources for everyone. ⭐ Your Feedback Matters! Love the app? Rate us 5 stars! Have suggestions? Share your feedback to help us improve. Source code: https://github.com/norkator/cryptography Ciphers • Scytale cipher. • Polybius Square. • Atbash cipher. • Caesar cipher. • Rot 1 - 25 cipher. • Affine cipher. • Rail Fence cipher. • Keyword cipher. • Beaufort cipher. • Templar Cipher with image send feature. • Porta cipher. • Vigenere cipher. • Gronsfeld cipher. • Autokey cipher. • Bacon Cipher. • Chaocipher. • Adfgvx cipher. • Playfair cipher. • Two-Square cipher (currently encrypt). • Tri-Square cipher (currently encrypt). • Four-Square cipher (currently encrypt). • One-time pad. • BIFID cipher. • Trifid cipher. • Hill Cipher with editable Matrix. • Visual Cryptography. • Enigma cipher with saveable settings. • RSA cipher with custom keys • Blowfish cipher • Twofish cipher (next gen Blowfish) • Threefish cipher • Rijndael (AES) cipher • SCrypt (Password-based key derivation function, in progress) • Elliptic Curve Diffie-helleman AES, similar to Curve25519 • ChaCha cipher (Salsa20) • Cast5 • Cast6 • Shacal2 • Shamir's Secret Sharing (SSS) algorithm. • RC2 • RC4 • RC5 • RC6 • Triple DES • Serpent • SkipJack • ElGamal • Anubis. • Khazad. • IDEA. • ARIA. • Navajo. • Mary, Queen of Scots. .. and more! Hashes • Whirlpool 0 / 1 / W (hashing) • HMAC - SHA1 / SHA256 / SHA512 (advanced hashing) • Adler32 (hashing) • CRC - 8 / 16 / 24 / 64 (hashing) • ELF-32 (hashing) • FCS-16 (hashing) • HAS-160 (hashing) • MD-2/4/5 (hashing) • RIPEMD - 128 / 160 / 256 / 320 (hashing) • SHA - 0 / 1 / 2-224 / 2-256 / 2-384 / 2-512 / 3-224 / 3-256 / 3-384 / 3-512 (hashing) • Shake 128 / Shake 256 • Tiger - T / T2 / 128 / 160 (hashing) • Sum - 8 / 16 (hashing) • Xor8 (hashing) • GOST (hashing) • BCrypt (hashing) • PBKDF2 (hashing) with java|php example. • SipHash hashing algorithm. • Skein hash. • Keccak hash. • Argon2 hash. (remote api) • Blake2b • SM3 hash. • Kupyna | DSTU7564. Encodings • Base16 (same as Hexadecimal) • Base32 • Base58 • Base64 • Base85 | Ascii85 • Base91 • Morse code encoder with sound playback. Sound may be annoying. • Braille • Semaphore • Tap Code • ASL (American Sign Language) • Pigpen • Elian Script • Betamaze • A1Z26 • T9 • RLE - Run-length encoding • Webdings and Wingdings. • Pig Latin. Post-Quantum • NTRU Tools • Unknown cipher tool. • WhatsApp message decipher tool. • Anagram solver tool. • Password generator tool. • Checksum tool for text and files. • Custom Hmac SHA 1/256 + SHA256 password authentication digest creator tool. (java|php examples) • File Encryption Tool. Read tutorial from links which are included in explanation view or in tool question mark. • Hash Cracker resources. • Password Strength checker tool. • Frequency Analysis. • ASCII table (8-bit/255) with search function. • Binary, Hexadecimal, Decimal and Octal table with search function. • Text <> Binary converter. • Decimal <> Binary converter. • Hexadecimal <> Binary converter. • Integer(number) <> Binary converter. • Hex <> Ascii converter. • Pseudo Random Number Generator (PRNG) with explanation. • AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases. • Steganography, encrypt decrypt tool in build. • ASCII Font Art tool. • Normal QR Code generator. • Normal QR code reader (camera or image) • Nato phonetic alphabet. Algorithms • Blum Blum Shub generator. • Haversine formula. Links Contact: http://www.nitramite.com/contact.html Eula: http://www.nitramite.com/eula.html Privacy: http://www.nitramite.com/privacy-policy.html
Cryptography

Cryptography-Nutzungsrang

Das Ranking der Nutzung basiert auf dem Algorithmus von Similarweb, der aktuelle Installationen und aktive Benutzer:innen über einen Zeitraum von 28 Tagen berechnet.

Alle Kategorien in
Vereinigte Staaten--
Tools in
Vereinigte Staaten#4,568

Täglich aktive Benutzer

Analysieren Sie die Nutzungsmuster von Cryptography Benutzern, indem Sie Cryptography Herunterladen und täglich aktive Benutzer im Laufe der Zeit anzeigen.

Benutzer

Analysieren Sie die Nutzungsmuster von Cryptography Benutzern, indem Sie Cryptography Herunterladen und täglich aktive Benutzer im Laufe der Zeit anzeigen.

Schalten Sie täglich aktive Benutzer frei
JanFebMär

Cryptography Ranking-Statistiken im Zeitverlauf

Similarwebs Nutzungsrang und Google Play Store Rang für Cryptography

Verwendungsrang

Rang

Cryptography Rangliste nach Land

Länder mit Cryptography der höchsten Platzierung in ihren Hauptkategorien


Benutzerinteressen und Top-Kategorien

Top-Kategorien und -Apps, die von Cryptography Benutzern verwendet werden

Top-Kategorien
Affinität
Top-Apps innerhalb der Kategorie
40%
Dorks - Hack
Kali Linux Master
Canvas Student
11%
Consumers Energy
GitHub
Microsoft Outlook
Google Drive
10%
Microsoft Authenticator
Indeed Job Search
7%
Calculator
DuckDuckGo Browser, Search, AI
Clock
Phone by Google
Google

Top-Wettbewerber und alternative Apps

Apps mit hoher Wahrscheinlichkeit, von denselben Benutzer:innen aus demselben Store verwendet zu werden.

CompTIA Security+ Exam Prep

CompTIA Security+ Exam Prep

Easy Prep

Teen & Adult Drivers Ed Online

Teen & Adult Drivers Ed Online

Aceable, Inc.

ASVAB Air Force Mastery

ASVAB Air Force Mastery

Higher Learning Technologies Inc

ASVAB Test Prep 2025

ASVAB Test Prep 2025

Spurry Inc.

Cryptography VS.

März 17, 2025