PHP Cryptography

PHP Cryptography script is mainly used to hash, encrypt and decrypt data for security systems. It can also used to encode PHP scripts to protect the code.
  1. No Screenshot
    1738 total visits
    Anti_Mcrypt takes a given key to encrypt data and checks if it is within the allowed length range. The key is padded salt string if necessary to make sure that the actual encryption key always has the maximum length. The key is used to encrypt or decrypt data with the help of the PHP mcrypt functions. Requirements: PHP 5.0 or ...
  2. No Screenshot
    1852 total visits
    phpSHIELD 3 PHP Encoder protects your PHP Source Code with a powerful, easy to use encoder, which creates a native bytecode version of the script and then encrypts it. Some other PHP encoding systems do not use bytecode and it is very easy to reverse engineer their protected scripts back to the original source code. With bytecode encryption, it is ...
  3. No Screenshot
    1738 total visits
    SourceGuardian 7 PHP Encoder is the ultimate protection solution for your PHP scripts. Version 7.0 introduces a host of new and enhanced features. SourceGuardian has become an essential tool for many web developers and programmers, offering the ability to protect their PHP code and therefore their intellectual property. The new version contains all of the same useful features customers have ...
  4. No Screenshot
    1846 total visits
    A specified secret key is used to encrypt and decrypt the data in Encryption and Decryption with Rijndael 256. There is also a function to generate a random password made only of alpha-numeric characters and encrypt it using the specified secret key.
  5. No Screenshot
    1494 total visits
    iDealCerts can create certificate in the name of a given organization, with a given password, that are valid for a given number of days. The certificate's private and public keys are generated inside a specified directory. Requirements: PHP 5 or higher
  6. No Screenshot
    1689 total visits
    A string of data can be encrypted using a specified key. RC4 Cipher can also do the opposite, i.e. decrypt the encrypted data with the same key.Requirements: PHP 5.0 or higher
  7. No Screenshot
    1839 total visits
    Secure Session Class can set a given session variable using the CAST 128 class to encrypt the values before storing them.Session variables can also be retrieved and their values decrypted.Requirements:PHP 5.0 or higher
  8. No Screenshot
    1651 total visits
    LSM Crypt Cookie is a simple class that can store encrypted values in cookies using a secret key. It can generate an encrypted version of a text value using a secret key and store it in a cookie.Whenever LSM Crypt Cookie is necessary to recover the original value, the class can decrypt the value stored in the cookie using the ...
  9. No Screenshot
    1504 total visits
    A data block can be encrypted using a specified key. The encrypted data is returned encoded with a variant of the base64 encoding algorithm that replaces +, / and = characters by -, _ and empty string.Encryption Class can also do the opposite, i.e. decrypt the data with the same key after decoding the base64 encoded encrypted data.Requirements: - PHP ...
  10. No Screenshot
    1706 total visits
    QCP64 CRC takes as parameters a string and data to compute the check, a seed value and the length of the checksum. A class variable is used to store the computed checksum.Requirements: PHP 3.0 or higher
  11. No Screenshot
    1750 total visits
    gksEncrypt uses RSA private and public keys to encrypt and decrypt the data. A private and public key pair with a specified bit length is generated.Requirements: PHP 5.2 or higher
  12. No Screenshot
    1418 total visits
    gEncrypter takes a key to generate a new alphabet that defines how the data to be encrypted should be encoded. The encrypted text can also be decrypted using the same key.Requirements: PHP 3 or higher
  13. No Screenshot
    2107 total visits
    Simplest Hash can be used to generate and verify unique hash values. It can be used to prevent that a form is submitted twice or a link be followed more than once.Simplest Hash generates a random hash value and store it in a MySQL database table. It assures that the hash is unique among all stored hash values. It can ...
  14. No Screenshot
    1767 total visits
    A defined key is used to perform the encryption and decryption.
  15. No Screenshot
    1720 total visits
    AzDGCrypt is not recommended for usage with strings that exceed 30 characters.
Pages 3 of 7« 1 2 3 4 5 6 7 »