Home / Data Security and Privacy / Encryption and Cryptography

Encryption and Cryptography

Secure your data with encryption and cryptography. Protect sensitive information from unauthorized access.

Try these 353 AI Encryption and Cryptography Tools

Guardtime
Free

Guardtime View Guardtime

Guardtime is the pioneer of Keyless Signature Infrastructure (KSI), a revolutionary blockchain technology that generates tamper-proof cryptographic metadata at scale. This metadata definitively verifies data properties like time, identity, integrity, and provenance without requiring any trusted third parties. Guardtime’s advanced Black Lantern platform empowers organizations to continuously monitor and secure every digital asset, component, and configuration within their network, ensuring real-time awareness of asset integrity across its entire lifecycle.

Keyless Signature Infrastructure (KSI) for scalable metadata generation
Immutable proof of data integrity, time, identity, and provenance
Black Lantern Platform for real-time asset integrity monitoring
HCC Embedded
Free

HCC Embedded View HCC Embedded

HCC Embedded provides deeply embedded software components designed for the core of any system, ensuring secure, safe, and reliable data management for IoT applications. With over 250 components and proven expertise in flash management, file systems, networking, and security, HCC empowers organizations to meet stringent safety and quality requirements across diverse industries.

Deeply embedded software components for core system integration
Secure, safe, and reliable data storage and communication
Out-of-context development for maximum portability
HEQA Security
Free

HEQA Security View HEQA Security

HEQA Security (formerly QuantLR) delivers the world's most cost-effective and easy-to-integrate Quantum Key Distribution (QKD) solution, empowering leading global organizations to safeguard their communications against all current and future quantum threats. Our QKD solution is the only proven quantum-safe technology designed for scalable network security, seamlessly integrating into existing infrastructure with the simplicity of standard networking hardware. Achieve unparalleled security without compromising on cost or implementation ease.

Cost-effective Quantum Key Distribution (QKD)
Easy-to-integrate into existing networks
Highest level of quantum-safe security
HOBI International
Free

HOBI International View HOBI International

HOBI International, Inc. is a premier provider of secure and compliant IT asset lifecycle management solutions. Specializing in mobile, IT, and data center assets, HOBI offers end-to-end services including traceable device management, reverse logistics, data erasure, refurbishment, and responsible recycling. Our proprietary HOBI Shield® tool ensures NIST-compliant data destruction, complemented by DOD-compliant wiping and physical shredding for ultimate data security and environmental stewardship.

NIST-compliant data erasure (HOBi Shield®)
DOD-compliant data wiping
Physical hard drive shredding
HyperSphere
Free

HyperSphere View HyperSphere

HyperSphere Data Protect is a groundbreaking, patented cyberstorage solution engineered to safeguard your data against advanced AI, quantum computing, and ransomware threats. Leveraging the innovative QIDP process, HyperSphere employs multi-dimensional distribution and auto-rotating AES 256-GCM encryption to ensure unparalleled data resilience. This robust approach guarantees data integrity and availability, even in the face of sophisticated cyberattacks and compromised storage, while maintaining compliance with stringent data privacy regulations.

Patented cyberstorage solution resilience
Protection against AI and quantum threats
Ransomware and double extortion prevention
ID Quantique (IDQ)
Free

ID Quantique (IDQ) View ID Quantique (IDQ)

ID Quantique (IDQ), now with a controlling stake held by IonQ, is a premier provider of quantum-safe cryptographic solutions engineered for enduring data security. The company specializes in quantum-safe network encryption, secure quantum key generation, and quantum key distribution to safeguard sensitive information for financial institutions, enterprises, and government bodies worldwide. Leveraging advanced quantum cryptography, IDQ's solutions ensure long-term data protection against future quantum computing threats, while also offering high-performance quantum random number generators for diverse industries.

Quantum-Safe Network Encryption
Quantum Key Generation (QKG)
Quantum Key Distribution (QKD)
Identillect Technologies
Free

Identillect Technologies View Identillect Technologies

Identillect Technologies delivers a premier, user-friendly secure email solution designed to safeguard critical business communications with unparalleled simplicity. Our suite of products, including Delivery Trust, offers robust end-to-end encryption and comprehensive control over your emails throughout their entire lifecycle, ensuring regulatory compliance and fostering client trust. By empowering users with effortless protection and advanced features like recipient privilege restriction and reply security, Identillect makes sophisticated email security accessible and cost-effective for organizations of all sizes.

User-friendly secure email solution
End-to-end email encryption
Full email lifecycle control
InfoGuard
Free

InfoGuard View InfoGuard

InfoGuard is a premier Swiss cybersecurity and network solutions provider, serving a distinguished clientele across banking, insurance, industrial, energy, healthcare, and public administration sectors. We empower organizations with advanced security automation, integrating platforms like Tines to streamline manual tasks and enhance team efficiency. Additionally, our robust PDF DRM solutions from Locklizard ensure secure document sharing and sales by preventing unauthorized access, leakage, and piracy.

Comprehensive cybersecurity and network solutions
Security automation platform integration (e.g., Tines)
PDF Digital Rights Management (DRM) software
Infosec Global
Free

Infosec Global View Infosec Global

Infosec Global is a leader in cryptographic life-cycle management, delivering innovative technology and expert thought leadership to secure data, facilitate regulatory compliance, and foster trust for governments and enterprises worldwide. Their seasoned leadership team, comprising original inventors of fundamental cryptographic technologies like SSL and AES, offers proven solutions including ZenGRC for streamlined GRC, MIRACL for advanced MFA, and Authentic8's Silo browser for enhanced web security and control.

Cryptographic life-cycle management
Data security solutions
Regulatory compliance and trust
Inpher
Free

Inpher View Inpher

Inpher, now part of Arcium, is a leader in cryptographic Secret Computing®, empowering organizations to perform advanced analytics and machine learning on sensitive data without compromising privacy, security, or distribution. Their proprietary XOR Secret Computing® Engine (XOR) is built on secure multiparty computation, allowing computations to be securely distributed across multiple parties while ensuring no single party can access the raw data during the process. Inpher's technology resolves the conflict between data privacy and data usability, enabling simultaneous access.

Pioneering Secret Computing® for data privacy
Secure multiparty computation (MPC) engine (XOR)
Enables advanced analytics and machine learning
Input Output (IOHK)
Free

Input Output (IOHK) View Input Output (IOHK)

Input Output (IOHK) is a leading blockchain research and engineering company renowned for its commitment to academic rigor and evidence-based development. As a fully decentralized, remote organization, IOHK builds high-assurance blockchain infrastructure for diverse global clients, including public sector and government entities. IOHK is also the foundational force behind Cardano, a smart contract platform meticulously developed through peer-reviewed research, designed for unparalleled security, scalability, and robust support for transformative change.

Pioneering blockchain research and engineering
Development of high-assurance blockchain infrastructure
Commitment to academic rigor and evidence-based methods
Intertrust Technologies
Free

Intertrust Technologies View Intertrust Technologies

Intertrust Technologies pioneers advanced trusted computing solutions, architected to address complex data and IoT trust challenges across diverse industries and platforms. Our highly customizable offerings empower secure data collaboration and seamless device operations, enabling organizations to manage data, devices, applications, and operations without compromise. Unlock the full potential of your data by sharing it securely internally, with partners, and third-parties for accelerated insights, enhanced business operations, and the creation of innovative new revenue streams.

Trusted Computing Solutions
IoT Trust Management
Secure Data Collaboration
Ionic Security
Free

Ionic Security View Ionic Security

Ionic Security is a high-assurance platform providing robust data protection and control through strong encryption, centralized policy management, and complete customer key ownership. Its secure protocol and hybrid architecture mathematically guarantee secure transit and access, preventing any unauthorized interception, even by Ionic itself. The platform unifies data and application policies across all clouds, users, devices, and machines, eliminating policy silos and enabling appropriate data access and usage.

High-Assurance Data Protection
Centralized Policy Management
Fine-Grained Access Control
ISARA Corp
Free

ISARA Corp View ISARA Corp

ISARA Corporation is a leading innovator in quantum-safe cryptography, developing advanced security solutions to protect current and future computing infrastructures. Founded on the mission to enable a quantum-secure world, ISARA collaborates with global institutions to design and implement robust, class-defining cryptographic technologies that safeguard data against emerging quantum threats.

Quantum-Safe Cryptography Solutions
Post-Quantum Cryptography (PQC) Development
Risk Mitigation for Quantum Computing Threats
iStorage
Free

iStorage View iStorage

iStorage is a premier global provider of PIN-activated, hardware-encrypted portable data storage solutions, merging robust, user-friendly authentication with advanced hardware encryption to safeguard confidential data from theft or loss. Evolving beyond hardware, iStorage now offers integrated SaaS solutions like cloudAshur KeyWriter and Remote Management Console, empowering IT departments to manage and control devices within their infrastructure, ensuring data security and offering peace of mind with affordable hardware replacements.

PIN-activated hardware encryption
FIPS 140-2 Level 2/3 certified hardware
Tamper-resistant and ruggedized designs
Jetico
Free

Jetico View Jetico

Jetico offers a comprehensive suite of pure and simple data protection software designed to safeguard sensitive information across its entire lifecycle. Their powerful yet user-friendly solutions, including BestCrypt for robust encryption and BCWipe for secure data erasure, cater to a broad spectrum of users, from enterprise IT professionals to home users. With advanced features like centralized management via Jetico Central Manager for enterprise deployments, Jetico ensures robust security and compliance without compromising usability.

Full Disk and Container Encryption with BestCrypt
Secure File and Disk Wiping with BCWipe
Centralized Management for Enterprise Deployments (Jetico Central Manager)
Kalima Systems
Free

Kalima Systems View Kalima Systems

Kalima Systems revolutionizes Industrial IoT (IIoT) by providing a secure, real-time platform for data collection, transport, storage, and sharing. At its core, the Kalima IoT blockchain enables end-to-end encrypted communication from edge devices to the cloud and mobile workers. This innovative solution empowers organizations to build custom applications using open APIs and smart contracts, ensuring the integrity and trust of IIoT data across all operational touchpoints.

Real-time IIoT Data Collection and Transport
Secure Data Storage and Sharing
Dedicated IoT Blockchain Technology
Kapalya
Free

Kapalya View Kapalya

Kapalya, now rebranded as ArmorX AI, offers a comprehensive data protection solution for businesses, ensuring sensitive files are securely encrypted both at rest and in transit across diverse platforms. This user-friendly desktop and mobile application provides ubiquitous encryption for all corporate data, seamlessly protecting files on endpoints, servers, and public cloud storage. Users can confidently share encrypted files across multiple cloud environments, preventing unauthorized access and safeguarding against data leakage.

End-to-end encryption for data at rest and in transit
Cross-platform compatibility (desktop and mobile)
Seamless integration with corporate servers and cloud storage
KETS Quantum Security
Free

KETS Quantum Security View KETS Quantum Security

KETS Quantum Security is revolutionizing data protection by merging quantum technology with advanced integrated photonics. We deliver practical, miniaturized, and cost-effective quantum-safe cryptographic solutions designed to address the most critical security challenges faced by global enterprises. Our innovative approach provides ultra-secure communications through superior randomness generation and quantum key distribution, safeguarding sensitive data for governments, telecommunications, defense, and financial sectors.

Quantum-safe cryptographic solutions
Ultra-secure communications
Randomness generation
Kingston Technology
Free

Kingston Technology View Kingston Technology

Kingston Technology is a premier global provider of advanced memory and storage solutions, specializing in robust data security for both on-premise and cloud environments. Our comprehensive product portfolio includes state-of-the-art encrypted USB flash drives, self-encrypting SSDs, and external SSDs designed to safeguard sensitive information. By integrating Kingston's high-quality storage and memory solutions, organizations can enhance application performance and fortify their security posture in demanding data centers, cloud infrastructures, workstations, and virtual environments.

Encrypted USB Flash Drives
Self-Encrypting SSDs
Encrypted External SSDs
Klarytee
Free

Klarytee View Klarytee

Klarytee is a comprehensive SaaS platform designed to embed robust security directly into your sensitive content, extending granular control across AI, public cloud, and SaaS environments. Our data-centric security architecture ensures your data remains protected with consistent encryption and access controls, regardless of its location across supply chain, customer, or enterprise IT infrastructure. Experience the secure and compliant utilization of modern cloud services and generative AI, underpinned by a zero-knowledge design that guarantees your data's privacy and accessibility only to authorized users.

Data-centric security architecture
Granular access control for AI, Cloud, and SaaS
Persistent encryption across all environments
Kloke
Free

Kloke View Kloke

Kloke redefines data protection with its patented, next-generation security solutions designed to safeguard sensitive information across diverse locations. Built on a foundation of groundbreaking cybersecurity patents, Kloke introduces a novel digital asset class that offers unparalleled security. By seamlessly integrating advanced tokenization with foolproof behavioral biometrics, Kloke ensures that data remains exclusively accessible to authenticated individuals, rendering stolen credentials and the underlying data completely worthless.

Patented Data Protection Technology
Cross-Location Information Security
Advanced Tokenization for Data Obfuscation
KoolSpan
Free

KoolSpan View KoolSpan

KoolSpan delivers robust security and privacy solutions designed to protect businesses and consumers from the escalating risks of intellectual property theft and data breaches. Our cutting-edge platform enables users to conduct phone calls and send text messages with uncompromising security, leveraging FIPS 140-2 validated cryptography for military-grade protection. Simplified for seamless integration, KoolSpan works effortlessly on leading smartphones, making secure communication as intuitive as standard messaging, backed by extensive global patent protection.

FIPS 140-2 validated encryption for secure communications
End-to-end secure voice and text messaging
Easy installation and management on Android and iPhone
Kryptus
Free

Kryptus View Kryptus

Kryptus is a leader in advanced cryptographic solutions and information security, offering comprehensive expertise across hardware, firmware, and software. Pioneering cryptographic semiconductor technology in Brazil with the first ASIC AES accelerator, Kryptus has consistently set industry standards. Their ITI-approved ASI-HSM, the first and only to achieve maximum security certification (MCT7 NSH3), underscores their commitment to robust hardware security and market innovation. Beyond hardware, Kryptus delivers critical cybersecurity assessment services, including penetration testing, vulnerability assessments, and code reviews, ensuring end-to-end protection for your digital assets.

Hardware, firmware, and software cryptographic solutions
Pioneering ASIC AES accelerator technology
ITI-approved ASI-HSM (MCT7 NSH3)