Home / Data Security and Privacy / Encryption and Cryptography

Encryption and Cryptography

Secure your data with encryption and cryptography. Protect sensitive information from unauthorized access.

Try these 353 AI Encryption and Cryptography Tools

KT Secure
Free

KT Secure View KT Secure

KT Secure delivers robust cybersecurity solutions and managed services, powered by a dedicated team of highly qualified experts. Our offerings encompass comprehensive Secure Code Signing to ensure software integrity and authenticity, proactive offensive security services including penetration testing and vulnerability assessments, and specialized managed cryptography and key management with Hardware Security Module (HSM) deployment and monitoring.

Secure Code Signing Services
Penetration Testing
Vulnerability Assessments
KvantPhone
Free

KvantPhone View KvantPhone

KvantPhone provides unparalleled quantum-resistant secure communication for businesses and large enterprises, ensuring the utmost confidentiality for voice and instant messaging directly from your mobile device. Leveraging a best-practice methodology, KvantPhone guarantees that your sensitive conversations are protected against evolving threats, remaining completely inaccessible to third parties without requiring any specialized hardware.

Quantum-resistant encryption for future-proof security
Secure voice and instant messaging
Easy-to-use interface
LastPass
Free

LastPass View LastPass

LastPass is a leading provider of award-winning password and identity management solutions, built on a foundation of robust cloud security. Committed to user privacy and data security, LastPass ensures sensitive information is always protected and encrypted, even from LastPass itself. The company continuously innovates to advance digital security, empowering users with effortless management of their online identities and data in an increasingly complex digital landscape.

Secure password generation and storage
Automatic form filling
Secure sharing of passwords and sensitive information
Lattica
Free

Lattica View Lattica

Lattica delivers a cutting-edge cryptography solution enabling privacy-preserving interactions with AI services, built on the principle that Fully Homomorphic Encryption (FHE) can be practical for AI inference through targeted optimizations. By architecting Lattica as a modern machine learning stack rather than a standalone cryptographic problem, it achieves exceptional speed, scalability, and seamless integration into existing AI workflows. Our platform leverages deep expertise in cryptography, neural networks, and AI infrastructure to provide a developer-friendly experience, making secure AI deployment as straightforward as traditional cloud model deployment.

Practical Fully Homomorphic Encryption (FHE) for AI Inference
Optimized for Speed and Scalability in ML Workflows
Seamless Integration with Existing AI Infrastructure
LAVAAT
Free

LAVAAT View LAVAAT

LAVAAT empowers embedded device manufacturers to build highly secure IoT solutions without requiring extensive in-house expertise in embedded security or cryptography. Our comprehensive platform simplifies the entire secure development lifecycle, abstracting complex cryptographic operations and key management. This allows you to efficiently implement robust security features, secure your software supply chain, and meet stringent customer, industry, and regulatory compliance demands.

Simplified cryptographic operations for embedded systems
Abstracted key management and lifecycle handling
Secure software supply chain enablement
Lavabit
Free

Lavabit View Lavabit

Lavabit introduces the Dark Internet Mail Environment (DIME), a revolutionary, open-source platform engineered for secure, end-to-end asynchronous communication. DIME distinguishes itself by addressing critical security vulnerabilities often overlooked by other encrypted services, offering an automated, federated encryption standard that operates seamlessly across diverse service providers. It significantly minimizes metadata leakage without reliance on a centralized authority, powered by its novel DMAP and DMTP protocols designed to supplant traditional IMAP.

End-to-end encryption for complete message privacy.
Open-source and auditable for maximum transparency.
Federated architecture supporting multiple service providers.
Ledger
Free

Ledger View Ledger

Ledger is a premier provider of robust security and infrastructure solutions for the cryptocurrency and blockchain ecosystem. Leveraging its proprietary BOLOS operating system, Ledger secures both individual crypto assets via its wallet line and enterprise-grade applications through Hardware Security Modules (HSMs). The company is dedicated to safeguarding a diverse range of critical digital assets, including financial instruments, IoT devices, and digital identities, ensuring the integrity and security of the evolving digital landscape.

Proprietary BOLOS Operating System
Secure Chip Technology for Wallets
Hardware Security Modules (HSMs) for Enterprise
Leibniz-Rechenzentrum (LRZ)
Free

Leibniz-Rechenzentrum (LRZ) View Leibniz-Rechenzentrum (LRZ)

The Leibniz Supercomputing Centre (LRZ) is a premier academic computing and IT service provider dedicated to advancing research and education across diverse scientific fields, with a particular focus on information security and data protection. Located in Garching near Munich and operated by the Bavarian Academy of Sciences and Humanities, LRZ offers state-of-the-art supercomputing resources and essential IT services, including high-performance computing and vital network access through the Munich Scientific Network (MWN). LRZ empowers academic and scientific endeavors with robust technological support.

High-performance Supercomputing Resources
Advanced Information Security Solutions
Comprehensive Data Protection Services
Let's Encrypt
Free

Let's Encrypt View Let's Encrypt

Let's Encrypt is a globally recognized, non-profit Certificate Authority that provides free, automated SSL/TLS certificates to secure websites and enable HTTPS encryption. Operated by the Internet Security Research Group (ISRG), Let's Encrypt is dedicated to fostering a more secure and private internet by simplifying the acquisition and deployment of digital certificates, making web security accessible to all.

Free SSL/TLS Certificates
Automated Certificate Management
Open Source and Community-Driven
limes datentechnik
Free

limes datentechnik View limes datentechnik

Since 1985, limes datentechnik gmbh has been a leading innovator in cryptography and data compression, establishing the FLAM product family as an internationally recognized standard for secure, efficient, and sustainable data management. Our unwavering commitment to end-to-end security has earned the trust of global financial institutions, tax authorities, and major industrial and telecommunications firms who rely on FLAM's robust interoperability with open standards and diverse file formats. We bridge disparate data worlds, offering a powerful solution for comprehensive data protection and seamless integration.

End-to-end data security since 1985
Internationally accepted standard for data handling
Expertise in cryptography and data compression
LockLizard
Free

LockLizard View LockLizard

Locklizard is a leading provider of robust PDF Digital Rights Management (DRM) solutions designed to safeguard sensitive documents from unauthorized access and distribution. Go beyond traditional password protection with Locklizard's secure public key technology, offering seamless and highly secure document sharing and sales. Protect your valuable intellectual property, including ebooks, training materials, and reports, with advanced controls like AES 256-bit encryption, licensing, device locking, and IP restrictions, ensuring data integrity wherever your documents reside.

Advanced PDF DRM Protection
Passwordless Security via Public Key Technology
AES 256-bit Encryption
LuxQuanta
Free

LuxQuanta View LuxQuanta

LuxQuanta delivers state-of-the-art Quantum Key Distribution (QKD) systems, engineered to fortify communication channels in environments demanding the highest levels of security. Leveraging deep expertise incubated at ICFO, a global pioneer in photonics and quantum technologies, LuxQuanta provides a quantum-safe layer of security that seamlessly integrates with existing network infrastructures, offering unparalleled protection beyond conventional cryptographic methods.

Quantum Key Distribution (QKD) for advanced security
Designed for stringent security requirements
Seamless integration with existing networks
MagiQ Technologies
Free

MagiQ Technologies View MagiQ Technologies

MagiQ Technologies is at the forefront of commercializing quantum technologies, founded in 1999 to pioneer the future of secure communication. Their flagship Quantum Photon Network (QPN) solution sets the standard for advanced network security by offering an unassailable defense against critical key distribution and management vulnerabilities. By leveraging the fundamental laws of quantum mechanics for key generation and dissemination, MagiQ QPN ensures that cryptographic keys are inherently random and cannot be intercepted during exchange, providing future-proof security against evolving threats, including quantum computing.

Market-leading Quantum Cryptography solution
Fool-proof defense against key distribution challenges
Keys generated from truly random quantum characters
Materna Virtual Solution
Free

Materna Virtual Solution View Materna Virtual Solution

Materna Virtual Solution delivers advanced mobile security, empowering secure and user-friendly mobile work environments for today's digital and mobile society. Our SecurePIM Enterprise solution provides robust data protection through end-to-end encryption within a secure container, ensuring sensitive business information remains protected on iOS and Android devices while safeguarding employee privacy. Administrators can efficiently manage security policies and data access with the intuitive SecurePIM Management Portal and Gateway, enabling seamless remote data erasure if necessary.

Secure access to business-critical data on mobile devices
End-to-end encryption of corporate data in a secure container
Remote data erasure to protect company information
Mega
Free

Mega View Mega

MEGA offers secure, end-to-end encrypted cloud storage with a focus on user-controlled privacy through its User Controlled Encryption (UCE) technology. This robust service protects your data from ransomware, insider threats, and cyberattacks, ensuring your digital assets remain confidential and protected. Ideal for individuals and businesses, MEGA delivers powerful cloud storage and backup solutions that empower your right to privacy.

End-to-End User Controlled Encryption (UCE)
Secure Cloud Data Storage & Backup
Browser-based High-Performance Encryption
Mercury Systems
Free

Mercury Systems View Mercury Systems

Mercury Systems is a premier provider of trusted, secure mission-critical technologies for the aerospace and defense sectors. They specialize in safeguarding sensitive data and critical systems at the chip scale through their advanced BuiltSECURE™ Technologies. This robust solution integrates physical security, cryptography, and secure boot features directly into FPGA and SoC designs, ensuring unparalleled protection even in the most hostile environments and against sophisticated cyber threats.

Chip-scale security and cryptography IP cores
BuiltSECURE™ Technologies for FPGA and SoC designs
Industry-leading physical security
MerlinCryption
Free

MerlinCryption View MerlinCryption

MerlinCryption provides advanced infrastructure security software, specializing in next-generation encryption, robust authentication, and high-entropy random data generation. Our solutions are engineered to protect sensitive data across diverse sectors including Cloud, VoIP, eCommerce, M2M, and USB hardware, safeguarding against inherent encryption risks with our forward-looking ASBE 2008 bit -2GB variable-key length cryptosystem. MerlinCryption empowers businesses with superior cyber defenses, offering cost-effective key management and eliminating the need for expensive Public Key Infrastructure (PKI).

Advanced encryption against known and critical risk factors
Proprietary ASBE 2008 bit -2GB variable-key length cryptosystem
High-entropy random data generators
Metrarc
Free

Metrarc View Metrarc

Metrarc introduces ICMetrics™, a revolutionary technology for generating secure encryption keys directly from the inherent properties of digital systems. This innovative approach eliminates the need for storing sensitive encryption keys, digital signatures, or ICMetric data, fundamentally enhancing data security. By addressing a critical gap in current cybersecurity practices, Metrarc's solution is poised to accelerate economic expansion for online services across e-commerce, m-commerce, banking, and IoT sectors.

On-demand encryption key generation
Eliminates key storage requirements
Leverages inherent digital system properties
Micron Technology
Free

Micron Technology View Micron Technology

Micron Technology is a global semiconductor powerhouse, delivering innovative memory and secure storage solutions for critical applications across networking, mobile, and IoT ecosystems. Our advanced SSDs, including self-encrypting drives (SEDs), provide robust data-at-rest protection against breaches and unauthorized access, ensuring the integrity and security of your sensitive information. We empower the future of connected devices with specialized embedded memory for IoT and high-performance, low-power mobile memory solutions designed for next-generation smartphones and tablets.

Advanced Self-Encrypting Drives (SEDs) for data-at-rest protection
Rock-solid SSDs engineered for network infrastructure
High-performance, low-power memory for mobile devices
Mobilen Communications
Free

Mobilen Communications View Mobilen Communications

Mobilen Communications leads the digital privacy revolution with secure, private, and reliable wireless services designed to protect against evolving threats like SIM swapping. Leveraging cutting-edge 5G Post Quantum Network technology, we ensure all data transmissions are secured, prioritizing your data in transit. Our mission is to provide the industry's leading privacy-focused wireless experience, bringing true mobile privacy back to a connected world.

5G Post Quantum Secure Network
Advanced SIM Swap Protection
End-to-End Data Encryption
Moonlock
Free

Moonlock View Moonlock

Moonlock provides advanced, human-centric cybersecurity solutions designed to seamlessly integrate into your digital life, ensuring robust protection for your devices and data. Our software is built on the principle that technology should empower, not endanger, your personal information, safeguarding your memories, communications, and creative work.

Advanced anti-malware technology for comprehensive threat detection
Seamless integration for unobtrusive protection
Dedicated research team for cutting-edge cybersecurity insights
MPC Alliance
Free

MPC Alliance View MPC Alliance

The MPC Alliance is a premier consortium of leading developers and practitioners dedicated to advancing the awareness, acceptance, and adoption of Multibarty Computation (MPC). We bridge the gap between groundbreaking MPC technology and real-world application, fostering cross-industry education and exploration of its vast potential to enhance online service security and privacy. Our mission is driven by industry pioneers with deep academic and commercial roots, collectively championing MPC as a transformative solution for diverse market needs.

Promotes awareness and adoption of Multibarty Computation (MPC)
Fosters cross-industry education and collaboration
Explores diverse use cases and market possibilities of MPC
MyDocSafe
Free

MyDocSafe View MyDocSafe

MyDocSafe offers a comprehensive, all-in-one solution for secure document management and e-signatures. Leveraging top-tier encryption, it ensures the utmost protection for sensitive information, mirroring the security standards of financial institutions. Beyond robust data protection, MyDocSafe streamlines workflows by enabling effortless control, automation, and secure sharing of documents, while also facilitating compliance and seamless integration with your existing systems.

Advanced Document Encryption
Secure E-Signature Verification
Automated Document Workflows
Myntex
Free

Myntex View Myntex

Myntex delivers robust, end-to-end mobile security solutions tailored for enterprises and high-net-worth individuals, ensuring unparalleled data protection and privacy. Our integrated ecosystem, featuring the forensically validated ChatMail® E2EE communications suite and the Google-independent Renati operating system, eliminates common attack vectors by removing or disabling non-essential functionalities and third-party applications. Myntex's commitment to security is underpinned by a secure Canadian data center with 99.9% uptime, providing advanced counter-espionage and surveillance defense.

End-to-end encrypted messaging, calling, and notebook with ChatMail®
Renati: Google-services-independent, security-first mobile operating system
Elimination of vulnerabilities via removal/disabling of web browsers, GPS, USB, Bluetooth, and NFC