Análisis de la app Cryptography para 17 de marzo

Cryptography

Cryptography

  • Nitramite
  • Google Play Store
  • Gratis
  • Herramientas
Unlock the World of Cryptography! Cryptography is your all-in-one toolkit for exploring, learning, and experimenting with encryption, ciphers, hashing, and encoding methods. Whether you're a beginner or an expert, this app offers a wide range of tools and resources for everyone. ⭐ Your Feedback Matters! Love the app? Rate us 5 stars! Have suggestions? Share your feedback to help us improve. Source code: https://github.com/norkator/cryptography Ciphers • Scytale cipher. • Polybius Square. • Atbash cipher. • Caesar cipher. • Rot 1 - 25 cipher. • Affine cipher. • Rail Fence cipher. • Keyword cipher. • Beaufort cipher. • Templar Cipher with image send feature. • Porta cipher. • Vigenere cipher. • Gronsfeld cipher. • Autokey cipher. • Bacon Cipher. • Chaocipher. • Adfgvx cipher. • Playfair cipher. • Two-Square cipher (currently encrypt). • Tri-Square cipher (currently encrypt). • Four-Square cipher (currently encrypt). • One-time pad. • BIFID cipher. • Trifid cipher. • Hill Cipher with editable Matrix. • Visual Cryptography. • Enigma cipher with saveable settings. • RSA cipher with custom keys • Blowfish cipher • Twofish cipher (next gen Blowfish) • Threefish cipher • Rijndael (AES) cipher • SCrypt (Password-based key derivation function, in progress) • Elliptic Curve Diffie-helleman AES, similar to Curve25519 • ChaCha cipher (Salsa20) • Cast5 • Cast6 • Shacal2 • Shamir's Secret Sharing (SSS) algorithm. • RC2 • RC4 • RC5 • RC6 • Triple DES • Serpent • SkipJack • ElGamal • Anubis. • Khazad. • IDEA. • ARIA. • Navajo. • Mary, Queen of Scots. .. and more! Hashes • Whirlpool 0 / 1 / W (hashing) • HMAC - SHA1 / SHA256 / SHA512 (advanced hashing) • Adler32 (hashing) • CRC - 8 / 16 / 24 / 64 (hashing) • ELF-32 (hashing) • FCS-16 (hashing) • HAS-160 (hashing) • MD-2/4/5 (hashing) • RIPEMD - 128 / 160 / 256 / 320 (hashing) • SHA - 0 / 1 / 2-224 / 2-256 / 2-384 / 2-512 / 3-224 / 3-256 / 3-384 / 3-512 (hashing) • Shake 128 / Shake 256 • Tiger - T / T2 / 128 / 160 (hashing) • Sum - 8 / 16 (hashing) • Xor8 (hashing) • GOST (hashing) • BCrypt (hashing) • PBKDF2 (hashing) with java|php example. • SipHash hashing algorithm. • Skein hash. • Keccak hash. • Argon2 hash. (remote api) • Blake2b • SM3 hash. • Kupyna | DSTU7564. Encodings • Base16 (same as Hexadecimal) • Base32 • Base58 • Base64 • Base85 | Ascii85 • Base91 • Morse code encoder with sound playback. Sound may be annoying. • Braille • Semaphore • Tap Code • ASL (American Sign Language) • Pigpen • Elian Script • Betamaze • A1Z26 • T9 • RLE - Run-length encoding • Webdings and Wingdings. • Pig Latin. Post-Quantum • NTRU Tools • Unknown cipher tool. • WhatsApp message decipher tool. • Anagram solver tool. • Password generator tool. • Checksum tool for text and files. • Custom Hmac SHA 1/256 + SHA256 password authentication digest creator tool. (java|php examples) • File Encryption Tool. Read tutorial from links which are included in explanation view or in tool question mark. • Hash Cracker resources. • Password Strength checker tool. • Frequency Analysis. • ASCII table (8-bit/255) with search function. • Binary, Hexadecimal, Decimal and Octal table with search function. • Text <> Binary converter. • Decimal <> Binary converter. • Hexadecimal <> Binary converter. • Integer(number) <> Binary converter. • Hex <> Ascii converter. • Pseudo Random Number Generator (PRNG) with explanation. • AFSK (Audio Frequency-shift keying) generator. Receiver comes in future releases. • Steganography, encrypt decrypt tool in build. • ASCII Font Art tool. • Normal QR Code generator. • Normal QR code reader (camera or image) • Nato phonetic alphabet. Algorithms • Blum Blum Shub generator. • Haversine formula. Links Contact: http://www.nitramite.com/contact.html Eula: http://www.nitramite.com/eula.html Privacy: http://www.nitramite.com/privacy-policy.html
Cryptography

Clasificación del uso de Cryptography

El rango de uso se basa en el algoritmo de Similarweb que calcula las instalaciones actuales y los usuarios activos durante un periodo de 28 días.

Todas las categorías en
Estados Unidos--
Herramientas en
Estados Unidos#4,568

Usuarios activos diarios

Analiza los patrones de uso de los usuarios de Cryptography viendo las descargas de Cryptography y los usuarios activos diarios a lo largo del tiempo.

Usuarios

Analiza los patrones de uso de los usuarios de Cryptography viendo las descargas de Cryptography y los usuarios activos diarios a lo largo del tiempo.

Desbloquea usuarios activos diarios
enefebmar

Estadísticas de clasificación de Cryptography a lo largo del tiempo

Rango de uso de Similarweb & Rango de Google Play Store para Cryptography

Clasificación de uso

Clasificación

Clasificación por país Cryptography

Países en los que Cryptography tiene la clasificación más alta en sus categorías principales


Intereses de los usuarios & Top categorias

Principales categorías y aplicaciones utilizadas por los usuarios de Cryptography.

Categorías principales
Afinidad
Principales aplicaciones de la categoría
40%
Dorks - Hack
Kali Linux Master
Canvas Student
11%
Consumers Energy
GitHub
Microsoft Outlook
Google Drive
10%
Microsoft Authenticator
Indeed Job Search
7%
Calculator
DuckDuckGo Browser, Search, AI
Clock
Phone by Google
Google

Principales competidores & aplicaciones alternativas

Aplicaciones con una alta probabilidad de ser utilizadas por los mismos usuarios, desde la misma tienda.

CompTIA Security+ Exam Prep

CompTIA Security+ Exam Prep

Easy Prep

Teen & Adult Drivers Ed Online

Teen & Adult Drivers Ed Online

Aceable, Inc.

ASVAB Air Force Mastery

ASVAB Air Force Mastery

Higher Learning Technologies Inc

ASVAB Test Prep 2025

ASVAB Test Prep 2025

Spurry Inc.

Cryptography VS.

marzo 17, 2025