[email protected]
TSM Inc. is dedicated to bringing the worlds of Cryptography and Delphi together. Each fulfils a need: Cryptography provides individuals with the privacy they have come to expect in an age where snooping is easy, and Delphi provides access to the Rapid Applications Development for everyman. TSM Inc. believes this intersection of two enablers has a great future…
The TSM Inc. Mailing list will tell you when further crypto components are released, and when improvements are made to existing components. Your information will not be passed onto third parties.
Join our mailing list!
Enter your email address below,
then click the 'Join List' button:
  Delphi Crypto Software 

Software using Borland Delphi (also supports Borland C++Builder) based around the theme 'encryption'. You are free to download, distribute or use anything you find here. Freeware licences are available for non profit use. Commercial versions with full source code are also available. See the link 'Register' for full details.
 

 
SHA - Secure Hash Algorithm A Delphi / C++Builder implementation of the Secure Hashing Algorithm. The 160 bit hash produced by SHA is 'cryptographically secure', that means the input cannot be calculated from the output. 

A common use of SHA is for securely storing passwords in a way that neither requires a time consuming encryption nor ever reveals the stored password - an example of this is included in the archive. 

TSM SHA supports both the SHA and the SHA-1 standards 

Register or  Order Online 
 
 
Secure Hash Algorithm
Blowfish A Delphi implementation of the popular and fast 'Blowfish' algorithm. Blowfish is royalty free and does not have any known weaknesses. This implementation offers all the usual modes of operation (ECB, CBC, CFB and OFB) and additional procedures added for encrypting files, buffers and strings. TSM Blowfish also includes support for base64 encoding and decoding strings. 
Register or  Order Online 
 
 
 Blowfish
Elliptic Curve PK Component Elliptic curves offer the best public key security with the smallest possible key length. This component allows you to add the strongest per bit PK crypto to your application with the smallest effort by simply dropping the component on the form. Supports encryption / decryption / signing / verification / key generation 
Register or  Order Online 
  
 
Elliptic Curve
 
DES The 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but makes up for that to some extent by being probably the most thoroughly inspected block ciphers. (Supports ECB, CBC, CFB and OFBmodes.) 
Register or  Order Online 
 
 
DES
Slock - Shareware protection Slock gives you, as the developer of software, the possibility to drag and drop a registration component onto a form in your application, and have the immediate ability to control the length of time your application will work. Slock allows you to limit the number of days, the number of starts or set a specific date after which your application will not run, as well as a timeout mode.Slock also allows you to store registration information hidden in a DLL. 
Register or  Order Online 
  
 
 SLock 
MD5 - Message Digest algorithm MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today. 
Register or  Order Online 
  
  
 MD5 
RIPE-MD160 - Message Digest algorithm RIPE-MD160 provides a 160-bit cryptographically secure hash (Message Digest) of a given input. RIPE-MD160 was developed by the European Union, and is generally accepted to be of equal strength to SHA-1. 
Register or  Order Online 
  
 
 RIPE_MD 
TRC6 - Ron Rivest's AES candidate which offers screaming performance and the touch of one of the founding fathers of modern cryptography. Offers encryption using 128, 192 or 256-bit keys - the first of a new breed of ciphers! 
Register or  Order Online
  
  
 RC6 
TRSA - RSA PK Implementation Beta1 - The original RSA algorithm conveniently packaged as a Delphi component. This beta is fully functional, and needs only the addition of error handling and a few other methods before we can call it complete. The Beta is limited to 1024 bit keys. 
 RSA beta1 
TTwofish - The successor to Blowfish and the AES candidate from Bruce Schneier. Coming soon!
TMars - The AES candidate from IBM and Coppersmith. Coming soon!
"The Lab"

In this section we give you the chance to see what's happening in the TSM "Lab". Some of these experiments will never make it out of the Lab, while others will be added to our product range.

We have published these so that you, the customer, can give us your feedback where the following succeed and where they fail. All feedback is gratefully received, and we reward the most helpful suggestions..

Securemail 'Smail' (Includes Delphi source code) This is a Public Key eMail encryption / decryption system. Based roughly around PGP. sMail uses a greatly simplified approach to key acquisition and maintenance. sMail supports encryption to multiple recipients. 

This code is donated to the Public Domain in the hope that it can be further developed and refined. All I ask is that if you make any improvements to the code, please let me have a copy of them so the development effort can be co-ordinated, otherwise feel free to do as you see fit with this. Contributors to the sMail project will receive full licences for the components used in sMail. 

If you wish to work with the sMail source code, you will also need to download TEllipticCurve, TBlowfish and MdTray.

sMail
md_tray
 
WinPGP32 (Includes Delphi source code) This is a front-end (yes, another front end) for PGP. Originally started as a project before the days of PGP5, provides a useful basis for integration of the highly trusted PGP2.x into Windows95. This code is donated to the Public Domain, but is far from complete or satisfactory. All I ask is that if you make any improvements to the code, then please let me have a copy of them, otherwise feel free to do as you see fit with this.
Winpgp32
 
Diamond & Sapphire (Includes Delphi source code) These small and fast algorithms (Diamond is a 10 round block cipher, Sapphire II is a stream cipher) are as yet unbroken, but have not been widely analysed. Useful for casual purposes until more is known about the security of these. Good implementations. Bonus! Also includes a CRC32 unit. (By Michael Paul Johnson)
Diamond & Sapphire
Nothing to do with Delphi! Or Crypto for that matter - a Cute Dog animated Cursor. Download the Dog now and stuff him into the \Windows\Cursors directory! (If you get problems downloading this file, hold down the shift key while you click the link)
Animated Dog Cursor

TSM Software Showcase

In this section we give you the chance to see what TSM's customers are doing with the TSM range of crypto components.

 TSM Software Showcase

  Delphi Crypto Graveyard

Algorithms that are either of poor quality, offer a poor level of encryption, have flawed implementations which compromise the security, or are simply written in a way that does not meet our high standards for cryptographic components. It is not recommended that you use anything from this section.

 TSM Delphi Crypto Graveyard (It's spooky!)
 

 

ScramDisk

ScramDisk allows you to mount encrypted volumes under Windows95 and Windows98, giving you the possibility to make sure your personal data is kept away from prying eyes. This is freeware, and compares well with commercial products such as Bestcrypt and Safehouse.

The author wishes to remain anonymous.

ScramDisk V1.02 ScramDisk allows you to mount encrypted volumes under Windows95/98, and offers a number of ciphers (Blowfish, Idea, Des and square to name a few). You can mount either a partition, a file or a .wav file as the encrypted volume, the latter option providing the ability for steganographic protection. 

For full information, go to  http://www.hertreg.ac.uk/ss/ 

Free!

ScramDisk
 
 
Page version 15 - 21July1998