wodCrypt ActiveX component

Crypt ActiveX, Crypt component


wodCrypt ActiveX provides your Windows applications unbreakable encryption, digital signatures and message hash/digest calculation functionality. Its ease of use will allow you to use it almost immediately. The provided Blob object makes it suitable for almost any kind of data conversion.

Crypt image

Download

Try it out for 30 days

Get update

Already bought wodCrypt? Get latest version here

Release notes

What's new or changed, latest version is 2.2.5

Sample code

Steps to use wodCrypt

Discuss

View forum discussion

Online help

Browse detailed documentation


Pricing per developer

Single developer license
USD 139.00
Single developer license (includes full source code)
USD 289.00
Developer team 3+ (at least 3 licenses, 15% discount)
USD 354.45
License includes one year of free updates and unlimited lifetime technical support. Each developer must have his own design-time license.

General information

wodCrypt is a lightweight component that provides strong encryption for your applications. It provides support for most common crypto algorithms, such as

  • AES
  • DES, TripleDES
  • Blowfish
  • Cast
  • RC2
  • RC4
  • RC5
  • UNIX crypt command
for symmetric encryption and decryption,
  • RSA
  • DSA
for making and verifying signatures, and
  • MD5
  • SHA1
  • SHA256
  • SHA386
  • SHA512
for creating hashes.


Working with Blobs

For performing data manipulation, wodCrypt works with Blobs (Binary Large OBjectS - although they don't have to be Large!). The Blob is our object for reading and writing data - which means you can read and write string variables and bytes arrays. What's more, they can present the information in BASE64 and HEX encoded format if your environment doesn't like to work with binary data. A Blob is, by definition, an abstract object. We have created three variants of it: MemBlob, FileBlob and StreamBlob - you can use whichever of these is more appropriate to your application.


MS Authenticode signatures

wodCrypt can create digital signatures based on Microsoft Authenticode technology. Assuming you have valid code signing certificate, you should just call SignEXE method to have your file digitally signed. No more Internet Explorer warnings will appear after you sign your files.


Optimized code

Besides working in accordance with cryptography standards (i.e. without random padding and internal wrapping), wodCrypt can also work in Optimized mode. In this case it is unlikely that other encryption tools will be able to (directly) access your encrypted data, because wodCrypt will add specific information to it such as the size of the Blob. Optimised mode ensures that after decryption you will get exactly the same plaintext as you had before encryption. When working to standards, wodCrypt has to look after block sizes, key sizes etc.. for each protocol, so any empty spaces need to be filled with zeros. It's not a smart way to protect the data - but it's necessary so that text that has been encrypted by wodCrypt remains accessible to other decryption tools and continues to give the expected results.


Licensing - royalty free

wodCrypt is royalty free - once you create your application you can distribute binary versions of wodCrypt free of charge. Licenses are purchased for design-time development only, one license for each developer on the project is required - and that's all!
Besides the ActiveX version (which can be used even in FoxPro), wodCrypt has a COM object as well, which can be used from many environments, such as VB, VC, Delphi, VBS, ASP etc..


Additional notes

* The wodKeys component is included in our setup package free of charge. It can be used for private key management - to Generate new keys, Load/Save keys, obtain public keys etc.. The helpfile can be found here.