Security Products

This page is a subsection of the Crypto link farm. Links to further crypto and security-related information can be found there.

Access Control

ActivCard Home Page
Authentication/single sign-on card.
Argus Products & Services Page
Extra security measures for Java programs, Orange Book/ITSEC security modules.
BRICKHouse Secure Web Server
ACL-based web server security.
Cambridge Neurodynamics
Biometric identification systems.
Capella Electronics - Security Systems
Access control and security sensors.
Check Point FireWall-1
FireWall-1 firewall.
Cerberus Homepage
Win 3.1/Win95 access control.
Core SDI SA
Network scanners, authentication and security modules.
Cryptocard Corporation
User authentication and remote access management tools.
CyberSafe - Products
Kerberos and public-key based single sign-on, access control.
CYCON Labyrinth og CYCON technologies and Cypress Consulting
The Cycon labyrinth firewall.
GEZ Microsystems Inc. - Oakville, Ontario, Canada
Fingerprint verification products.
e.g. Software
Auditing, security alerts, password analysis, and security software for Netware.
Hardcastle Electronics
Firewalls, security gateways, F-secure.
identikey
Java-based access control over SSL.
Intracept - X-Ray Vision
Blocks Java, ActiveX, and cookies to web browsers.
Kalliopi: DELPHI Security - We've got it covered!!
Access control to Delphi apps.
Keyware Technologies
Biometric security products.
KyberPASS
Certificate-based access control.
MARX CRYPTO-BOX Software Copy Protection
Software and hardware-based copy protection.
medcom Home Page
Firewalls, tiger team testing, WWW security.
Micah Development
Access control for DOS and Windows.
New-Tech Systems
DOS/Windows access control software.
PCGUARDIAN Home Page
PC access control and encryption software.
SAGUS Products Page
Security gateway, firewall, Winsock interface.
Schumann Products for Enterprise Security
Single sign-on, access control management.
Sealabs
Watchguard firewall and security management software.
SecureLogix: Corporate
Firewall for phone networks.
SecurePilot
PalmPilot based challenge-response authentication supporting a variety of popular protocols.
Secure Storage
High-security storage facility.
Sesame
Euro-Kerberos
SOL - Security On Line
Phsyical security items and information.
Startek Engineering Inc.
Fingerprint verification products.
Technical Incursion Countermeasures
Auditing, consulting, and training for networks, firewalls, security policies, and assurance testing.
The ULTIMATELY Secure Firewall
Wingate Lan to Internet Software
Windows Internet proxy.

Data Encryption

3Si Products and Services
Crypto hardware accelerator cards.
Aegis Research Corporation
Windows PGP shell.
American Stealth Messenger
Email encryption software which is probably some form of rebadged PGP.
Ancort
File, email, disk, voice encryption including IDE data channel encryption hardware. Proprietary algorithms.
Archsoft Security Software Solutions -Cerberus
Desktop encryption for Windows using Blowfish.
ASIC International - Cryptographic Cores and Technologies
DES, SHA-1, MD5, bignum maths cores.
AspEncrypt.com - ASP Component for File Encryption, Digital Signatures, Secure Mail and X.509 Certificate Management
IIS ASP component for encryption and digital signatures.
Atalla
Network and internet security processors and solutions.
Australian Privacy Home Page
Australian PGP vendor.
Avalanche Java Cryptography Toolkit
Encryption, hash functions, and secure random number generation in Java.
Babylon
ISDN BRI and PRI online encryption hardware, secure servers, VPN products, all using RSA with triple DES (single DES optional). Frame relay and X.25 encryption using DES or proprietary algorithm.
Baltimore | Products
Crypto systems toolkit - DES, IDEA, RSA, DSA, RIPEMD, SHA1, MD2, MD5, X.509/CA toolkit, email security software.
BBN Security
SafeKeyper tamperproof hardware key storage.
BestCrypt family of Data Protection systems
GOST and DES software/hardware encryption for DOS/Windows.
BetweenUs: Features
Secure chat program using CAST128/3DES/Blowfish, written in the free world.
Bitvise Home Page
Windows SSH client/server.
Blowfish Advanced Download Site
Blowfish file encryption for DOS and Win95.
Bokler Software's Home Page
DES and hashing DLL's and OCX's.
Briggs Softworks: Software
Directory snoopper/file eraser, file encryption for Windows.
Brivida, Inc. - Technology for Virtual Private Networks "VPN"
VPN's using IPSEC DES encryption.
Brokat X*PRESSO Home Page
Secure non-US encryption by adding another layer of 128-bit encryption over the top of the US crippled 40-bit version.
Business Security home page
Fax, video, voice, and modem encryption.
Bytefusion Products
Secure mail relay.
C & A
CA and timestamping software, SSL servers and clients.
carrick Encryption Home Page
DES and Blowfish file encryption.
CE Infosys GmbH
Fast DES hardware, encrypting SCSI controllers, PCMCIA cards, from a non-US source.
CellCase Key Agile ATM Encryptor
RSA/triple DES ATM link encryptor.
Certicom
Elliptic curve cryptosystem products.
CES Home Page
Phone and fax encryption add-on (questionable algorithm).
Chrysalis ITS - Product Information
Encryption hardware and crypto accelerators.
Ciphermax
Pure ECC-based file encryption.
Cisco Network Encryption Services
DSA-signed DH for link and session encryption.
Citadel Products
Firewall/VPN, Windows file encryption.
CodedDrag
Drag-and-drop DES encryption for Win95/NT.
Cold Fusion Power Packs
Encryption/decryption, credit card processing, for Cold Fusion.
Communication Security Corporation Home Page
Diffie-Hellman and triple DES speech encryption. No GAK.
Communication Systems - East Infosec Home Page
Secure comms gear for government use.
Computer Development Systems Crypto Page
Link encryption hardware, file and fax encryption software (unknown algorithm).
ComScire QNG From Quantum World
Johnson-noise-based RNG for PC parallel ports.
Condor - Secure Ubiquitous Portable Interoperable Communications Buzzword Buzzword
Secure Fortezza-protected voice and data over celluylar links.
Confidentiel : Présentation
Mac file encryption, approved by the French secret service.
CoolFish
Blowfish file encryption.
CopyTele, Inc.
Phone and fax communications encryption.
CoreDesign
Royalty-free Verilog PKC core.
CPE Security/PKI
Swiss resellers of various US security products (Entrust, ActivCard, Datakey), although some require US export permits.
CPKtec Technology
Crypto algorithm implementations for embedded systems.
CRYTEK Communications - Secure Telephone Adaptor
Key-based subband voice scrambler. Uses Diffie-Hellman key exchange, but a questionable encryption function "based on matrix multiplication".
Cryptext
Win95/NT 4 encryption shell extension.
Crypto AG Switzerland
Encryption software and hardware of all kinds (but see also the links in the "Crypto Social Issues" section).
CryptoEx 1.0
PGP add-on for MS Exchange.
Cryptomathic homepage
Encryption and security software and consulting.
Cryptosystem ME6
MD5-based file encryption.
CSM Proxy Server - The Ultimate Gateway to the Internet
Proxy which includes SSL tunnelling.
CustomTracks Home Page
ZixMail mail encryption with 3DES and RSA. Software contains US government backdoors, thus its exportability.
cv cryptovision
Smartcard-based ECC implementations.
Cybanim
PEM software, bignum maths package.
Cybernetica - CryptoChip project
IDEA + RNG + bignum accelerator on a chip. Produced in the free world.
Cylink Corporation
Cypris
Lockheed Martin's crypto processor.
Data Encryption Key PANDORA
DES/RC4 file encryption using a USB dongle, unfortunately keys are hardcoded into the dongle.
DATACRYPT Home Page
File and file transfer encryption (unknown algorithm).
DataGuard® - The Software Safe
IDEA and SEAL file encryption for Win32.
DataSAFE encryption software by NovaStor
Pasword-based file encryption using Blowfish.
DEMCOM: Steganos for Windows 95/98/NT Homepage - The home of steganography
BMP/DIB/WAV/VOC/text/HTML stego with RC4 encryption.
Deming Software
S/MIME software for MS Exchange and Eudora.
DES
DES core for FPGA's/ASIC's.
DES Core
VHDL DES core.
Design Automation - CyberLock
DES-based encryption program. Fairly standard stuff, but the marketing smells of snake oil ("most secure file encryption available", "patented encryption enhancement technology", etc).
D.I.C.A. ISDN Encryptor
ISDN link encryption using FEAL 16, IDEA, or DES.
Digital Delivery
Secure (encrypted) software and information distribution systems.
Diskcrypt 95
Floppy drive encryption for Windows 95.
docSpace Direct
Secure data transmission via a web browser and SSL, but intermediate storage is unencrypted on a third-parties sever.
DubnerCruncher
Very fast bignum maths card for PC's.
e-Lock, Security Solution from Frontier Technologies,Home
Digital signature/encryption software and interfaces (implemented as wrappers around crypto toolkits like BSAFE and CryptoAPI).
EasyCrypt
DES file encryption.
EasyPrivacy
DOS, Win95, and NT file, drive, and email encryption using IDEA, file wiping,
EES Family Data Sheet
Clipper chips.
EMD Enterprises
Win95/NT anti-virus and encryption software.
Encrypt-It Plus
DLL/VBX/OLE control providing DES and 3 other (unknown) encryption algorithms.
Encryption Plus
Encryption for Visual Basic.
Encrytor
DES file encryption for Windows.
Entrust - Home Page
(Formerly Nortel) Entrust cryptography product family. GAK alert: These products are GAK-ready.
ERACOM - Encryption Adaptors
Encryption toolkits, DES encryption hardware for PC's.
F-Secure Cryptography Products
Windows/Unix <-> Windows/Unix link encryption with secure telnet, X11, port forwarding, etc. The link is encrypted with algorithms like triple DES or Blowfish, with 1024-bit RSA for key exchange an authentication.
f5 - Intelligent Building Blocks for a Smarter Web
SSL accelerators.
FileVault
File encryption using 64-bit (?) Blowfish.
FineCrypt
File encryption using Blowfish, CAST-128, GOST, IDEA, and RC5.
Forge - Distributed Environment Solutions
JCE, SSl in Java.
Formal Systems
X.509 certificate viewer, PKI, encryption services and consulting.
FORTEZZA Developers Home Page
FORTEZZA PC Cards
Links and information for Fortezza developers.
Fortress Technologies
VPN's.
Free, secure, reliable, E-mail
Email encryption using 2Kbit RSA and Blowfish.
Frontier Technologies e-Lock Home Page
PKCS/X.509 and S/MIME key management, signing, secure email and browser.
Fulltime RSA
RSA speech encryption for PSTN lines.
fun communications - http://www.fun.de/
Crypto, SSL, certificate managent software from the free world.
GDS: Encryption, Authentication, Transaction Security
Link encryption hardware from ISDN up to T3 speeds.
Gemini Computers, Incorporated
Orange Book A1 certified network processor.
Global Technologies Group, Inc.
Products based on the German SuperCrypt DES/triple DES chip.
GTEI-CyberTrust-SafeKeyper-Overview
Hardware-based key management for CA's.
GTGI PowerCrypt Web Site
A HiFn chip on a PCI card.
Hammercore DES Cores
FPGA DES cores for Altrea FPGA's.
Hide Me for Windows
Windows file encryption, unknown algorithm.
Highwinds Trading Company Products
Various crypto-related add-ons to the Mac OS.
HRB Systems
Data encryption products (an division of E-Systems)
IBM cryptography: cryptographic cards home page
IBM's (really cool) 4758 crypto module.
IBM SecureWay
Data encryption, security, consulting.
iD2
Smart cards, PKCS #11/CAPI drivers, certificate management, SSL tunneling.
I.D.E.A Encryption for Windows
Win95 file encryption.
IDS - Products
Disk encryption using Blowfish, PGP-compatible mail encryption using RSA+IDEA, smart cards.
INFOSEC Products
Triple DES file encryption for Windows.
International Cryptography Framework
HP's international big brother design.
Internet Solution Security (Pty) Ltd
Access control, electronic commerce, 128-bit SSL proxy.
Internet Smartsec
Internet security technology (knowledge of Swedish useful).
Interscope BlackBox Homepage
DES-based file encryption.
Inventra Soft Cores Current Documentation
DES cores.
Invincible Data Systems, Inc.
PGP - compatible encryption software for e-mail, hard disk encryption, access control hardware tokens.
IPivot Products
SSl accelerator boxes (now swallowed by Intel).
iPower Home Page
National's PCMCIA crypto card.
IRE Product Catalog
Network and link encryption hardware.
ISC Products
Email encryption, crypto toolkits, encrypted Zmodem.
ISDN Encryptor
iSolv Technologies
S/MIME with 2Kb RSA, 3DES, crypto toolkit.
Java Cryptography Extension
Java crypto extensions (JCE).
JVDE EBackup
File encryption/archiving using DES, Blowfish, CAST128.
Kremlin
Win95/NT drag-and-drop file encryption.
Kryptel - File Encryption Software for Windows 95/98
File encryption using Blowfish, 3DES, IDEA, Twofish.
Kryptology Home Page
Snake oil for the masses.
LAN Crypto Programms
Document and file encryption and digital signature software using proprietary algorithms.
Langley System Web Site
Floppy disk encryption software.
Lintel Security
DES and RSA encryption chips and hardware.
LUC ENcryption Technology (LUCENT) Limited
Lucas-function based PKC.
MAILguardian and MAILguardian Enterprise
Email encryption using DES, 3DES, Blowfish and DH (but will automatically and transparently fall back to sending cleartext - this is listed as a feature of the software).
Marathon Computer Press Jumpstation
DES, Blowfish file encryption, disk wiping.
Markus Hahn's Software Page
File/data encryption using Blowfish, Twofish, RC4, Cobra128, GOST, triple DES, and CAST.
Megacrypt/MVS : cryptography made efficient and easy for IBM/MVS mainframes
DES, 3DES, and Blowfish for MVS.
Microlink's Solution of the telephone wiretapping,eavesdropping and interception, telecom security solution
POTS and ISDN phone encryption.
Motorola Advanced INFOSEC Machine (AIM)
Motorola crypto processor.
Motorola SSTG Secure Telecom Products
Morotola secure phones and fax and data communications products.
Mykotronx!
Clipper and Capstone chips and related products.
nCipher products
Hardware crypto accelerators.
NetFortress
Network link encryption.
NetLOCK(tm) Network Security
IPSEC-based VPN security.
Netseal Product Specifications
IPSEC/ISAKMP/OAKLEY drives for ODI, NDIS, and Linux.
Next Wave Software
DES-based file encryption for the Mac.
NEXUS Solutions NTrust
Blowfish encryption for Windows.
Nokia Clustered IP Solutions - CryptoCluster VPN Gateways
IPSec boxes.
NTrust
Blowfish file encryption.
Ocean Logic DES
VHDL/Verilog DES core.
Okiok Data Security Products
Crypto processors.
Opera Software - Bringing speed and fun back into Internet browsing
Non-US web browser with strong SSL encryption.
PC-Encrypt Email Security
Blowfish file encryption (web page smells slightly of snake oil).
PGP -- Pretty Good Privacy, Inc. Home Page
PGP Tools from Net Services
Windows front-end for PGP.
SSLava
SSL in Java.
Phobos SSL Offloading and Accelerating Products
SSL accelerators.
PIJNENBURG Beheer N.V.
Cool RSA/bignum and DES/triple DES encryption hardware.
PKIMagic
Entrust-based S/MIME integrated into Lotus Notes. View pages with Java turned off, or just wait for their spam to arrive in your mail.
Pointsec Mobile Device Security Solutions
Disk encryption using Blowfish and CAST-128, combined with user authentication using passwords or smart cards.
PowerCrypt Website
PEM and S/MIME encryption for the Power Mac.
Private Data - Protecting your privacy with innovative products
Disk encryption for Win95 (unknown algorithm).
PrivateExpress
Some sort of secure tunnel for email (details are sketchy and the "proof" of security even more so).
Psypher/EDI+
DES EDI encryption.
Racal/Airtech Security
Various access control and security products.
Rainbow Technologies Internet Security Group
CryptoSwift crypto hardware accelerator.
RAMPART for DOS/Windows
DES encryption software and other utilities.
Reflex Magnetics - homepage
Secure FTP, mail, modem encryption using DES, 3DES, Blowfish, or IDEA.
RPK Public Key Cryptography
Crypto SDK and email software utilising a new, fast discrete-log-over-GF(2^k) based PKC.
RS Cryptographic Development Kit
Public-key crypto toolkit.
RSA Data Security, Inc.
RSA DesignObject
RSA processor core.
RSA2048A
2Kbit RSA processor RTL Verilog core.
S to Infinity - Encryption  Page
Windows file/directory encryption using RC4.
SAFE Folder
Transparent Win95 file encryption.
SafeHouse Drive Encryption
DES disk encryption for Win3.x/Win95 (exportable 56-bit because it's GAK-ready).
SafeMessage Home Page
Secure ICQ-type application using Elgamal and Twofish.
SafePassage Web Proxy
Full-strength encrypting web proxy which bypasses US export restrictions.
SandTiger
File encryption using Blowfish, CAST-128, and Diamond2.
SAWFTWARE
Secure archiver (3DES, Twofish, Blowfish).
Secret!
Secure PIN/password store for the PalmPilot.
Sectra Defence Communication Systems
Secure phones, encrypting routers and encryption cards using proprietary algorithms.
SECUDE Produkte
File encryption, S/MIME, CA products, security consulting.
SecureCRT
Win32 SSH client.
Secure Email - 256 bit encryption for web mail
Server-based secure messaging service.
SecureFile
File encryption and signing for Win95/NT
Secure Link Services Ltd (SLS), DataGuard Family
Disk and file encryption using IDEA, SEAL, and PKC's). Note that this company is located in the free world (Switzerland), despite the .net address.
SECURE...Encryption and Security for all
DES and IDEA encryption software for Windows.
SecureOffice
Triple DES encryption add-on for MS Office.
SecureStore Homepage
File encryption using DES, triple DES< Blowfish, CAST-128, Diamond2, RC4.
SecureWin
Win95/NT file encryption using RSA and the BSAFE conventional algorithms, other security tools (eg secure delete, secure shutdown).
Security Domain: electronic message security
Public-key file encryption, CA software.
Security Encryption Software for SQL Server,MSDE,MS Access,File Encryption
Database encryption using 3DES and Blowfish.
SICAN DesignObject (TM): DES Data Encryption System
ASIC DES core.
Sioux: Sophisticated & Secure
Apache-based secure web server.
SKIP Information
Simple Key management for Internet Protocols - papers, information, implementations (US only).
SKIP in Russia
As above, without the export restrictions.
SMARTCrypt by WetStone
ActiveX interface to PKCS #11 modules.
Snapshield
Encrypted phone/fax/telecoms using Elgamal and DES.
Soft Concepts
Ncrypt file archiving, compression, and encryption utilities.
Software Design - Crypto for Windows by Gregory Braun
"Braun pretends to use the BlowFish algorithm to provide secure encryption in his
SoftWings Enterprises Inc
DES/triple DES protected OS/2 data transfer.
SoftWinter - Shade page
Disk encryption for Windows NT.
SoundCode, Inc.
Crypto libraries and software.
sshCE
SSH client for the Pocket PC.
SSL HTTP Security Solution
128-bit SSL proxy - turns crippled SSL browsers into full-strength encryption ones.
SSL Plus (Product)
SSL Plus SSL integration suite.
SSLP Reference Implementation Project
An SSL reference implementation (still under development).
SSRSSL
Secure sockets relay - full-strength SSL proxying.
Stealth Drive
Encrypted virtual disk volumes (the standards compliance section looks a bit odd).
Stealth Encryptor for Windows
Windows file/directory encryption using DES or Blowfish.
Stronghold Homepage
Apache-based secure web server.
SynCrypt
File and email encryption using Elgamal, Blowfish, IDEA, and triple DES.
tbCrypt
Win95/NT, OS/2, DOS file encryption using DES, IDEA, Blowfish, NewDES, and Lucifer.
TCC: Encryption products and solutions for Data, Phone, Voice, and FAX NETWORKS
Link encryption, phone and fax encryption.
TeamWARE Crypto
ICL's Windows file encryption software.
TecApro Internacional - Home page
Win95 file encryption.
Technology Nexus AB - Välkommen!
Encryption, digital signature, CA toolkits.
Templar Software and Services
Secure EDI over the Internet.
ThunderStore Product Overview
File, email encryption using Blowfish.
TimeStep - The Network Security Standard
VPN encryption systems using DES encryption and X.509 certificates and digital signatures for authentication.
TorDisk HomePage
NT disk encryption for hard drives, CDROM's, networks, using DES, triple DES, Safer, Blowfish, CAST-128.
Transcrypt Product Overview
Phone encryption devices and add-ons.
TrustedWeb
Intranet ACL-based security and encryption using RSA and triple DES.
Trust Services-Online Trust Center
S/MIME email plugin and CA.
TrustWorks products - Delivering information security products that you trust
SKIP-based VPN using pluggable encryption algorithms.
TSS OfficeLock - Data Security for Microsoft Office
Strong encryption for MS Office documents.
Tumbleweed : Solutions : Products
Secure mail, mail gateways, message, archiving products.
UCrypt
DES, triple DES, GOST, Blowfish, 3-Way, RC5, TEA, Safer, Shark, Diamond-2, and others.
Utimaco Safeware AG
DOS, OS/2, Windows encryption software, encryption hardware.
V-Disk Official site
Win95 drive encryption using Blowfish, with smart card support.
Vieka - Pocket PC
AES file encryption for the Pocket PC.
Virtually Online
SEMS email encryption using the RPK algorithm.
VPNet: Products
WAN VPN encryption products using DES and triple DES with SKIP key management.
WeOnlyDo! Components
SSH/SFTP client/server libraries for Windows.
Western DataCom Home Page - Data Security
Fortezza, DES encrypting modems, link encryptors.
Win Magic: SecureDoc
Triple DES disk encryption for Win95/NT.
Worldtalk Worldsecure
S/MIME encryption software.
Wormhole technologies
PKC-based email encryption software.
Xcert Software
Access control, X.509-related software.
X_DES Core Page
Verilog DES core.
XF-DES: Data Encryption Standard Engine Core
Xilinx DES core.
Zaxus
Crypto hardware modules, link encryption, smart cards.
Zergo WWW Site - Information Security Specialists
Crypto and CA products. They'll also design GAK protocols for backdoor access to your medical records if required.

Interception and Monitoring

Hardware and software for intercepting and monitoring information, and stopping of the same.

Applied Signal Technology Product Summary Introduction
Signals interception and monitoring gear.
Candes Systems Inc. - TEMPEST Computers and Peripherals
TEMPEST-shielded computer gear.
Cellular Monitoring Interface (via Electronic Countermeasures Inc)
Computer interface for intercepting cellphone traffic.
Computer Aided Technologies
Scanner software.
Covert Keyboard Press bug
Hardware keyboard sniffer.
Datascan TEMPEST monitoring system
Dynamic Sciences International: Emissions and Surveillence Equipment
Assorted Tempest toys.
Electroconductive Concrete ELFINCO
Makes for great TEMPEST shielding.
Fastscan
Win95/NT port scanner.
Fax Analyzer
PC fax interception card.
Force-Ten Online Catalog
Surveillance, wiretaps, spying equipment.
GENESIS Group online
Assorted bugs, transmitters, receivers, cellphone tracking and interception, fax interception, and other bugging and interception gear.
GCOM Technologies
GSM, cellphone, computer, and fax interception and monitoring equipment (the GSM interception unit features real-time, off-air interception of up to 1000 voice/data/fax transmissions, traffic targetting and screening, and call tracking, all with a friendly Windows interface).
GSM Monitoring - GSTA-1400
Complete GSM monitoring/interception system with call and target tracking and location features.
Kansmen Corporation
LittleBrother Internet monitoring call.
Keyboard Keystroke Logger for PC : KeyGhost : record or monitor keyboard keystrokes on PC
Hardware keystroke monitoring.
mobifinder
Mobile phone scanner and locator.
NDG Software Products
Various network monitoring and snopping tools.
NetWatcher
Monitor and intercept TCP/IP sessions.
Pager Decoding Interface (via Electronic Countermeasures Inc)
Computer interface for intercepting pager traffic.
PCProtect
Win95/98/NT keystroke logger.
Radte KG - Spytec
Bugs, speech and telephone interception gear, information on industrial espionage.
Spies:Law Enforcement
Cellular, GSM, and fax interception and monitoring equipment.
SPY Electronics, Communication and Surveillance Systems
Cellphone, fax interception gear.
SPY - Networkspy / -agent / -analysator
Sophisticated network sniffer which can extract files and data sent via FTP, HTTP, NNTP, SMTP, POP3, NetBIOS, search the data stream for keywords, and log usernames and passwords.
SpyZone Tools and Techniques
Industrial espionage and surveillance tools and techniques, security equipment, secure communications systems, disaster recovery, bug sweeps.
The Codex Privacy Site
Surveillance, stalking, privacy invasion, eavesdropping, and anything else related to these categories.
The Watcher Network Monitoring Program
Monitor and control any IP connection on a network.
TIRIS Products & Technology
RF identification and tracking devices.
TSCM.COM Counterintelligence Home Page
Technical Surveillance Countermeasures - bugs and wiretapping, detecting bugs, intelligence agencies, and counterintelligence.
Virtual ISA Proto Board
Xilinx 5210/4013E card.

Investigative Tools

Tools for investigating the security aspects of various things.

APS Powerful, yet Affordable EDA Tools
Developmemt boards from as low as $199.
Chip Express Corporation
Fast turn-around ASICs.
Chipworks
IC reverse engineering.
Code Classifier
Classify encrypted data by likelihood of encryption system used ("especially recommended for cipher generated outside North America where DES and private-key systems are not as dominant").
Convar Systeme Deutschland - Service Center
Disk data recovery.
Digital Instruments
Scanning probe microscopy (used to investigate magnetic media).
DoD Computer Forensics Laboratory
Carpe Machina!
ESS Data Recovery Inc.
Recovery of damaged disk data.
FPGA, CPLD: OptiMagic's Programmable Logic Jump Station
Starting point for hardware crypt-breaking information and tools.
Hack Watch News
Satellite and terrestrial TV scrambling systems.
IBAS Laboratories - Professional Data Recovery
Recovery of data from damaged or overwritten/erased magnetic media.
Investigating the Suspect Computer
DOS forensic software for recovering evidence from PC's.
IsoBuster, Ultimate CD and DVD Data Recovery tool (www.cdrecovery.net)
MUSIC Semiconductors
Various content-addressable memories, useful for investigating encryption algorithms.
Neuroptics Technologies, Inc.
Neural network hardware.
NTI Home Page
Computer forensic training, consulting, and tools.
Picosecond Imaging Circuit Analysis
IBM technique for imaging signals in chips.
Programmable Logic Jump Station ( FPGA, CPLD )
More investigative tools for encryption keys.
Technology Pathways LLC - Computer Forensics, Digital Discovery, Audits, Lockdown, ProDiscover DFT
Disk forensics tool.
Xilinx Product Information
Perfect for investigating currently unknown DES and RC4 keys.

Misc

APM - EMI Shielding Products
EMI shielding, useful for TEMPEST shielding.
AR Products
RF interference generators.
Argus Systems Group, Inc.
Operating system security add-on products for Solaris and Windows NT.
Automatic Response Systems
Document destructions products and services.
BEMA, Inc
Portable TEMPEST-shielding enclosures.
C&A Systems Security: Leaders in Security Risk Analysis, Risk Assessment & Risk Management
DES toolkits, risk analysis tools.
Clean Drive: Protect Yourself and Your Life
Drive cleaner. Sold via spamming, avoid this product.
Computer Security Update
Links to security-related bug fixes for MSIE and Windows NT.
COMSEC Solutions
Cryptography and biometric countermeasures consulting.
Consensus Products/Services
SSL Plus integration suite, RSAREF, IDEA licensing, code security screening.
CyberScrub Secure File Deletion / Internet Privacy Utility
Windows file deletion software.
Digital ID Center
Web interface to Verisign's digital ID (CA) service.
Disk Zapper
Floppy disk bulk eraser.
Embassy
DivX for your PC.
Emcom Products and Services
TEMPEST PC's, monitors, and comms gear.
Evidence Eliminator - What evidence is on your hard drive?
Drive sanitiser for Windows. Advertised through spamming, contains a booby-trap to silently disable itself. Avoid this product.
Framework Executive Back Orifice removal and protection tool
Program to remove Back Orifice.
Hackers Catalog Books
Various standards for satellite TV scrambling, cellphones, and scrambling-related encryption.
IBM SecureWay Home Page
IBM's security hardware and software, consulting, technology, and general information.
IP Packet Filter
Highly configurable kernel-level IP packet filters.
Kilben Business Services
Computer enclosures and alarms.
List of FPGA-based Computing Machines
Fast encryption hardware (with a little programming...).
NIC Law Enforcement Supply CATALOG - MAIN SITE
Law enforcement supplies.
Minatronics Corporation
Physical security products.
Proton Engineering Degausser & Declassification Systems
Magnetic and optical media degaussing and declassification systems.
SecureWave | SecureNT
NT kernel mode driver which protects against many buffer overflow attacks.
Security Engineering Services, Inc
TEMPEST and COMSEC engineering and consulting.
SEM - Security Engineered Machinery
Data destruction equipment and information.
The Bunker - Britain's ultimate safe house
Secure web hosting service.
Tempest Products
TEMPEST-secure communications and data processing devices.
Terminus 4... Leave No Traces...
Secure file deletion for Windows.
TNO-FEL
TNO physics and electronics laboratory (information security, electronic warfare, electronic security, sensor and weapons electronics).
Wang Government Services Secure System's HOME PAGE
Wang's TEMPEST products and secure services.
Wireless privacy / security, mobileCloak - mobile Cloak - mCloak
Portable Faraday cage for wireless devices.
Zero-Knowledge Systems | Freedom
Software to provide anonymity on the net.

Online Commerce and Banking

We do e-commerce because that's where the money and the suckers are.

Canada Trust
Online access to account balances, stock quotes, and other banking services.
CommerceEngine
A Rainbow crypto card in a PC case.
Credit Suisse Direct Net
Full online banking using 128-bit SSL proxies.
echeck
Electronic cheques.
EMJ America
Internet security and e-commerce products.
ICVerify Home Page
Online credit card, debit card, and cheque verification.
Internet-based digital cash
Links to various e-cash resources.
Netbill-related publications
Various online electronic transaction protocols.
Payment mechanisms designed for the Internet
Welcome to Online Banking!
Wells Fargo online banking.

Smart Cards

Smart cards? A certain animal cunning, perhaps.

3-G International
Smartcard based desktop security and access control software.
A safe Internet communication channel with smartcards
Masters thesis on secure client-server communication using smart cards.
A8 Corp
Smart card personalization and card management software.
Advanced Card Systems, Ltd.
Smart cards, card readers, development kits.
ACOLAs Homepage -Communication, Terminal Server and Data Collection Products
Smart card and RF card products.
AD-Teknik, Mainpage
Smart card emulators, PCB's, readers.
Amazing Smart Card Technologies
Smart cards, memory cards (up to 1Mbit), readers, development systems.
AMC Smart Card Reader Products
Smart card/mag stripe reader/writer.
American Biometric Company
Fingerprint readers, combined card/fingerprint readers.
AMP Smart Card Connectors
Smart card connectors and reader contacts.
Analysis of French T2G
Tech info on second-generation phone cards.
ASE - The Aladdin Smartcard Environment
Smartcard development kit.
Basic programmable smartcard
Bill's idea of a JavaCard?
B&C Data Systems
Smart card reader/writer.
Card Europe Main Index Page
Card Technology Web Site
Card Technology magazine online.
CardTech/SecurTech:Home
Smart card and security card conference information.
Catalyst Serial E2PROMs -- I2C Bus
Smart card EEPROMs.
Cavitronic
Programmers, smart cards, add-ons.
Chip Application Technologies
Multiapplication smartcard management software.
Chip Cards
Data sheets for various Siemens cards.
Chipcard, Chipkarten, Chipcards, Smartcards, Programmer für Chipkarten, Pay-TV-Cards,
Smart cards, programmers, software.
Chipkarten Technik
Technical details on various commons cards (phone cards, German KVK).
CITI Smart Cards
University of Michigan smart card research project.
Compelson Labs
Smart-card based key storage, file encryption, access control.
CompInfo - Smartcard Technology - Information Sources and Manufacturers
Links to sources of information on smart cards and card and card reader manufacturers.
Cop Card Site
Programming information and keys for COP cards.
Crownhill Associates Ltd
Smart cards, PIC programming, code recovery/reverse engineering.
CryptoCard's Security Products
Various access-control systems.
CyberMark > Products & Specs
Card terminals and card-based vending machines.
Dallas Semiconductor Corp: Home Page
Identification and authorization chips, secure microcontrollers.
Dallas Semiconductor Corp. iButton: Home Page
Digital credentials/timestamping/crypto in a button.
Datacard Group
Card printers, embossers, terminals.
Datakey Home Page
Smart card reader/writers, smart cards.
DataMega I/O Products
Smart card readers.
Die branchenübergreifende elektronische Geldbörse
Overview of smartcard-based payment systems (undergaduate thesis, in German).
Edgar Online - EdCard
C-based smartcard API.
EMV Technical Specifications
EMV card, terminal, and application specifications for smart card credit and debit applications.
Encotone Ltd. Home Page
Smart-card and smart-card-like authentication and security devices.
eToken: USB-based authentication for networks
USB-based crypto token. Need to enable Java, autoinstall, and a dozen other security holes for the demo to work.
Eutron
USB token with MD5, Blowfish, RSA.
Fingerprintcards
Smartcards with built-in fingerprint readers.
First Access Products
Contactless smart card authentication systems.
Fun With Smartcards
Notes from the HIP'97 Fun with Smartcards session.
GeldKarte and electronic banking home page
Information on various smart-card based electronic purse systems.
Gemplus Smart Card Home Page
German Smartcard Hacker Org.
GIS Home Page
Smart card readers, terminals, and developer kits.
GNU SmartCard Project
Smart card info, documentation, software, projects.
Goran Vlaski's Software Page
Smart card read/write/emulation software.
Guru's Lair: Scads of PIC microprocessor web site links
Links to PIC sites including PIC-based smart cards and card programmers.
HIP Smartcard Homepage: Cards
HIP'97 smart cards info.
How to do it: Private Key Encryption (A method)
"emulation of the One-time key system using large psuedo-random number generators" (linear congruential generators).
IBM Smart Card Solutions
IBM smart card technology and products.
IBM SmartCard for e-Business
IBM JavaCard and card toolkits and API's.
IBM Student Chipcard Innovation Team Homepage
Dutch student-designed card reader and software.
IC Card Reader / Writer
Smart card reader, PINpad, card authorisation terminal.
IC Card with Combined National ID and Health Insurance Card Functions
Taiwanese smart card/ID card project.
Identity Systems Security Inc.
Smart-card based identification.
i-Key from Rainbow Technologies: Product Overview
USB-based smart card-a-like (looks like it does MD5 onboard for challenge-response authentication).
Implementing Airline Electronic Ticketing Using Integrated Circuit Cards
Electronic ticketing project using smart cards.
incard Products
GSM, crypto, multi-application cards and software.
Infineon Technologies AG
Formerly Siemens smart card division.
i n f o t e c h n a
Smart card custom software development.
Inside Technologies
Contactless cards and SDK's.
Java(TM) Card(TM) Technology
Java kludged to run on a smart card.
KeyBlitz Project
Various smart card hacking initiatives, mostly targetting European pay tv systems.
Keycorp - Smartcards
Multos/Javacard/OSSCA (Keycorp card OS) cards and products.
KOBIL Systems GmbH: Chipkartenterminals
Smart card readers and terminals, smart cards.
Leapfrog Smart Products
Smart card development software, encryption software.
Litronic, Inc.
Smart cards, card API's, Fortezza cards.
Magtek Products
Magnetic card reader/writers.
Meinen, Ziegel & Co. GmbH: Products
Card production equipment.
Microchip Memory Data Sheets
Includes EEPROM memory for smart cards..
Micromodule Pte Lte, Singapore
Smart cards, readers, development kits.
Mondex Electronic Cash
Mondex electronic wallet (pretty content-free pages).
Motorola SmartCards (TM)
Databooks for Motorola microcontrollers (including smart card micros).
Motorola Smartcard
Smartcards for salesdroids - try the other non-Motorola Morotola card links instead.
Mühlbauer AG
Smart card manufacturing and assembly.
Multos - the smartcard gets smarter
Framework for running multiple applications in a card (pretty light on detail).
MUSCLE Smartcard Developers
Development and use of smart card-enabled apps in a Linux environment.
Nexus Products and Services
Mag card and smart card readers, PINpads.
Oberthur Products
Payment and electronic wallet cards, crypto cards, contactless cards.
OKI Personal Smart Card Reader
Electronic wallet balance checker.
Ordacard Israel
Mag stripe and smart cards
OpenCard Framework
Java smart card middleware.
OTI - OnTrack Innovations Israel
Contactless smart cards.
Paul Maxwell-King
Smart-card hacking-related hardware.
PEP Products & Services Page
Smart card readers, RFID products, crypto and flash cards.
Philips Smart Card Services
Philips smart cards.
pincash
Smart cards and readers.
POSH Mfg. Products Page
Card readers, terminals, development kits.
Proton World
Smart-card based electronic wallet.
PubliCARD
The Borg of smart cards.
Reiner SCT
Smart card readers.
QI Technologies Corp. - New Products for a Cashless Society
Smartcard spammers who target newsgroups and email. Avoid their products.
SCAD toolkit
Smart card application developer toolkits for Windows.
SCARD - Smartcard Resources
Smart card standards, interface software, hardware.
Schlumberger Universe of Smart Cards
Smart card readers, tools, SDK's.
SCM Microsystems - Products
Smart card readers, writers, and interface products.
SGS-Thomson Smartcard Products
Smart card information and data sheets.
Siemens Smart Card Integrated Circuits
No technical information, unfortunately.
SJB Research: Smart card news. As it happens. Every business day.
Live smart card newsfeed.
SIM-R/W 2x for GSM SIM Card BackUp
SIM reader/writer.
Smart Cards: A Case Study
IBM Redbook case study on smart cards.
Smart Card Cyber Show
Smart card news, trade information, vendors, and projects.
Smart Card Developer's Kit
Home page for the book, as well as individual card sales, ATR catalogue, and pointers to smart card info.
Smart Card Forum Home page
Nonprofit group promoting smart card use.
Smart Card Industry Association Website
Smart card info, product links, news.
Smart Card News
Smart card publicatiosn, technology, and information.
Smart Card Reader/Writer
Card readers/writers/PINPads.
Smart Card Resource Center
Links to chip manufacturers, companies, conferences, mag cards, readers, RF cards, and other smart-card related information.
Smart Card Web Server
Web server running on a Cyberflex smart card.
Smartcard Information Page
Smart card information, card types, and links to manufacturers.
Smartcard Security Information Page
Smartcard security news, standards, attacks, and links.
Smartcard Technology Ltd.
Card readers, POS terminals.
Smart Dynamics, LLC -- Software Products
Smart card interface tools for various environments and languages.
Smart Semiconductor Search
Search engine which links to most major embedded semi vendors.
Smartcards and other cards
Links to smart cards, memory cards, smart card readers, mag cards and barcode cards.
ST - Products
STMicroelectronics smart card chips.
Telecard Mapping Home Page
Info on reading/decoding phone cards.
The Smart Card Forum
General information on smart cards.
Thyron's Products Page
Smart cards, terminals, security software.
TOWITOKO homepage
Smart card readers.
Tritheim Technologies
Smart card readers and writers.
UNIPROG Universalprogrammer
CCC universal smart card programmer.
Versatile Card Technology - Products
Card manufacturers.
Who?Vision
Smart cards, keyboards, and card readers with fingerprint readers.
Xicor Inc.
EEPROM's, smart cards, flash memories.
ZeitControl Cardsystems
Mag and smart cards, card readers, contactless cards.
Zmit's Telecard Page
Information on phone cards, readers, interface software.

Snake Oil

Proprietary guaranteed unbreakable crypto we invented this morning in the shower. Note that many of these links tend to fade away fairly quickly (probably because the companies don't stay in business long), they've been left intact for the amusement value.

The Seven Warning Signs of Bogus Science
Article from the Chronicle which is also appropriate for detecting snake oil crypto.
Advacrypt
"AdvaCrypt is one of the most powerful encryption technologies" using "non-logical encryption", but it's difficult to assess because "AdvaCrypt has no documents".
AGS Encryptions Ltd. Security for Non-Specific Threat Scenarios
Security through, uhh, "At-Will Intractability Up to Plaintext Equivocation Achieved via a Cryptographic Key Made as Small, or as Large as Desired - Without Computational Penalty".
Arcot Systems, Inc.
Security product which functions by redefining reality to be what they want it to be, then solving a (somewhat minor) problem based on their reality rather than our one.
Arithmetica Home Page
"Our revolutionary discovery of zeta one-way functions and group theory one-way functions redefine the parameters of next generation encryption technology"... "For example, a 1024 bit key based on the product of two 512 digit primes could be broken with 2^32 calculations. The world's fastest computers can now operate at 2^40 calculations per second". The algorithm isn't snake oil, but the web pages go to show why you have anything prepared by marketing people checked before it's released.
Asier Technology Corporation
"With existing linear systems the time to compromise data [...]" (apparently 3DES and AES are linear) "Asier has the largest known key-space in the cryptographic industry. Asier is not a block cipher, does not use elliptical curves, does not use prime numbers or factoring, is not deterministic, is not linea "
ASK ToolKit Home Page
"not an encryption algorithm, but an accessory that can enhance and simplify any symmetric encryption algorithm". Apparently it's a keyed RNG, and you're expected to pay for this (presumably the extensive use of buzzwords adds value).
Biopassword Product
"Uses a patented proprietary algorithm" (make up your mind, which is it?)..."currently there is no competition for BioPassword(tm) due to the proprietary nature of the algorithm"... either they have their dates wrong or this thing has been in beta for over 10 years. From the people who brought you NetNanny censorware.
Black Leopard Systems of Canada
"offers the most sophisticated data security encryption system available today"... "371200 bit encryption with up to 140 levels of access, 18 encryption key formats, and up to 10 encryption algorithms"... "this proprietary system delivers a unique solution for each user with a duplicate system occurring only once in every 600,000,000 Black Leopard Encryption systems at this time".
Bodacion Technologies
"HYDRA defeats all known network penetration attacks. HYDRA is unhackable and virus-proof [...] and offers advanced security based on biomorphic mathematics".
Cennoid Encryption
"provides unique, very efficient, non-algorithmic based encryption".
Chantilley Products
"the fastest and strongest cipher of its kind in the world" ... "Professional and Diplomatic Solar Cipher"... "The best Pseudo Random Number Generator ever" (in mid-2001 these guys made a bid to take over Baltimore, which is a bit like the Cook Islands making a bid to take over the USA).
Ciphile Software
"Absolute online privacy - Level 3(tm)(c)(patent pending)" - "the best encryption software available today" - "unbreakable".
Control Communications Systems
"Absolute security - a morphing encryption rate of at least 20 kilobytes"..."will protect your data from the most sophisticated decryption systems that exist now or are likely to exist for years to come".
CyberEncode.com Encryption Software and Technology
"Possibly the world's fastest and most secure encryption algorithms"... "This new encryption is an amazing accomplishment. Cypher Mind had to be re-programmed over 10 times". This site has an entire suite of snake oil algorithms.
Crypto98 beta
Proof that you can do snake oil in QuickBasic as well as C ("it works by generating permutations").
Crypt-o-Text
Not the usual snake oil, but there's a program available (CrackCot) which breaks it.
Cryptor Homepage
Cellular-automata-based OS/2 file encryption.
Crypto.Com
"Crypto.Com's cryptology provides the theoretically ultimate encryption security [...] Crypto.com's advanced VYN algorithmic system has been evaluated by leading scientists and mathematicians".
Cybank
"Maximum security encryption... we use our own snake oil because public-key encryption has been proven to be insecure".
CyberAngel EXR - Product Information
Crypto using Blowfish or DES, but it transmits your password to a monitoring center in the US (this isn't snake oil in the usual sense but... sheesh).
Cygnaworks - Products
"offers security through its use of values derived from the installed hardware resident on the computer"..."examines a defined set of hardware on a computer with proprietary algorithms developed by Cygnaworx to create a unique Flexible Digital Signature (FDS)" (makes invalidating your signature as simple as getting a new hard drive or a motherboard upgrade).
DataCloak
"Uses a unique encryption process"... "the 4-cycle data stream encryption process".
Data Protect: DaProMas
Online banking fully protected by GSM security (that's the same GSM security which was broken in early 1998, and which (when not broken) at best offers you 54-bit crypto broadcast over the air where anyone can get it).
Data Protect
Self-proclaimed leading security expert Kimble analyses your security problems.
DataTech Systems - Home Page
Software which is "ABSOLUTELY IMPOSSIBLE TO CRACK. This can be proved as never has a file that has been encrypted... been cracked, even with utilising some of the best cryptographers living" [sic].
DESkey - software protection devices, license management and encryption technology.
Call your company "Data Encryption Systems" and you get to name your products DESkey, DESlock, etc (any relationship to any other algorithm called DES is purely coincidental).
E-crypt Encryption
"*the* revolutionary software package that allows for the secure exchange of email" (uses monoalphabetic substitution).
Encryption Encryption Encryption
"Don't be fooled by imitations - - this is the true CRYP program" - you'd want to *imitate* this thing?
Encryption Plus
"bitwise exclusive OR encryption" with a password... "virtually impregnable".
Encryption provides benefits and risks
"it has been mathematically proven that only a brute-force attack can break encryption"... "a Cray can break a 128-bit key in two days"..."perhaps passing an electric current through a leaf will solve the problem" (or you could smoke it and then write a crypto article).
Encryption Software - Great Encryption
The program is fast for its strength encrypting about 5,000 plaintext characters/second on an average PC). [...] The ciphertext produced is an elegant mix of 100 different cipher characters in an unbroken string.
Encryption Techniques
"RBackup's archives are virtually impenetrable"..."If someone does manage to crack RBackup's encryption scheme, we will immediately plug in one of six others we have ready to go"..."[a DES-encrypted message] was decoded using two banks of 120 extremely high-speed 32-bit Sparc workstations connected to two supercomputers running 24 hours a day for eight days".
Encryptor 4.0 The Ultimate in Securing Files On Your Computer
"uses a revolutionary newly discovered incremental base shift algorithm that makes unauthorised decryption of your files near impossible".
Enigma-7 Windows Superencryption Software
"The most powerful Windows encryption software available".
Enigma 2000
"Protect your information with a 4.5Mbit key [...] This is not a mathematical algorithm. Enigma 2000 uses an extended polyalphabetic cipher. [...] A further advantage is present in the key exchange process, which is handled by a simple password, allowing an encryption depth of up to 1.536 bits"
Evolv - Skipjack IC Info & Pricing
Encryption using "proprietary artificial intelligence engines", "light years beyond the security level offerend by any other encryption method". Incidentally, this Skipjack has nothing in common (apart from the name) with the USG's Skipjack.