• Post-quantum cryptography it's here


    Schedule custom background encryption tasks. Schedule background task with a few simple lines of code. No complexity thus enabling you to focus solely on your application or business goals. The scheduling of background tasks can be done on any type of .NET application and can be used with heavy workloads and user interface synchronization.

    Learn more »

    Make delivering great digital experiences look easy.
  • Mediacrypt Digital Experience Cloud puts your business where your customer experiences take place: in the cloud

    Learn more »

    Make delivering great digital experiences look easy.
  • The best digital experience is a consistent one.

    Simplify the creation, management, and deployment of your content and assets across sites, mobile apps, and more.

    Manage your sites with ease. Quickly create and deliver relevant web and mobile experiences, easing the demands on IT.

    Mobile content management. As you integrate mobile into your marketing efforts, ensure that the experience is ideal on every device.

    Learn more »

    The best digital experience is a consistent one.
  • All of your assets in one place.

    Easily manage images, videos, and other assets across every digital channel to deliver better customer experiences.

    Dynamic media. Work with a single set of master assets and serve unlimited variations, including size, color, format, resolution, and crop.

    Video. Create, manage, and deliver interactive video. Make it available to all screens and devices with a single URL.

    Personalized media. Test and preview content variations on your sites to deliver experiences tailored to individual customers. Help customers personalize product options before they buy.

    Learn more »

  • Our cloud thinking process creates unlimited possibilities

    Cloud is good for your business.

    When you come up into the cloud, you are better able to:

    - Manage complexity from various channels;
    - Implement marketing automation solutions;
    - Manage the shift from the traditional marketing funnel;
    - Handle mobile adoption.

    Learn more »

  • icon

    Cyber Security services

  • icon

    Digital experience

  • icon

    Is a consistent one

  • icon

    Your assets in one place

  • icon

    Our cloud thinking

Breaking news, latest news, and current events

  • 2016.08.01 (August 1, 2016): Mediacrypt.IDcypher.AES v2016.3.801.45 released on August 1, 2016



    The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext; decrypting the ciphertext converts the data back into its original form, called plaintext.

    The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits.


    U.S. export rules

    Encryption items specifically designed, developed, configured, adapted or modified for military applications (including command, control and intelligence applications) are controlled by the Department of State on the United States Munitions List.

    save Mediacrypt.IDcypher.AES.Test, Console output (Constantly updating)

    Reference Standards

    The Advanced Encryption Standard Algorithm Validation Suite (AESAVS)

    Appendix B. GFSbox Know Answer Test Values
    B.1. Keysize = 128
    KEY = 00000000000000000000000000000000
    IV or PLAINTEXT = 00000000000000000000000000000000
    B.2. Keysize = 192
    KEY = 000000000000000000000000000000000000000000000000
    IV or PLAINTEXT = 00000000000000000000000000000000
    B.3. Keysize = 256
    KEY = 00000000000000000000000000000000
    IV or PLAINTEXT = 00000000000000000000000000000000
    Appendix C. KeySbox Know Answer Test Values
    C.1. Keysize = 128
    PLAINTEXT and/or IV = 00000000000000000000000000000000
    C.2. Keysize = 192
    PLAINTEXT and/or IV = 00000000000000000000000000000000
    C.3. Keysize = 256
    PLAINTEXT and/or IV = 00000000000000000000000000000000
    Appendix D. VarTxt Known Answer Test Values
    D.1. Keysize = 128
    KEY = 00000000000000000000000000000000
    D.2. Keysize = 192
    KEY = 00000000000000000000000000000000000000000000
    D.3. Keysize = 256
    KEY = 000000000000000000000000000000000000000000000000000000000000
    Appendix E. VarKey Known Answer Test Values
    E.1. Keysize = 128
    PLAINTEXT and/or IV = 00000000000000000000000000000000
    E.2. Keysize = 192
    PLAINTEXT and/or IV = 00000000000000000000000000000000
    E.3. Keysize = 256
    PLAINTEXT and/or IV = 00000000000000000000000000000000

    save The Advanced Encryption Standard Algorithm Validation Suite (AESAVS)

    2016.07.30 (July 30, 2016): Mediacrypt.GMaps v2016.3.730.20 released on July 30, 2016



    Learn more »

    2016.07.27 (July 27, 2016): Mediacrypt.IDcypher.Blowfish v2016.3.727.45 released on July 27, 2016


    Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.

    Learn more »

    2016.07.27 (July 27, 2016): Mediacrypt.IDcypher.HmacSHA256.EncodingTest v2016.3.727.45 released on July 27, 2016


    English, čeština, Deutsch, español, français, italiano, 日本語, 한국어, polski, português, русский, Türkçe, 中文(简体) 旧版, 中文(繁體) 舊版

    Learn more »

    2016.07.25 (July 25, 2016): Mediacrypt.BotIdentify v2016.3.725.20 released on July 25, 2016

    Mediacrypt BotIdentify ASP.NET CAPTCHA. Powered by IDcypher cryptographic technology.

    Learn more »

  • 2016.07.24 (July 24, 2016): Mediacrypt.IDcypher.Hmac v2016.3.724.45 released on July 24, 2016

    MAC (Message Authentication Code) is a further improvement of hash functions for use with encrypted data. A hash function can reliably detect the data modification, but the opponent can easily forge the hash value to correspond to the deliberately changed data. MAC is based not only on the data, but also on the value of a secret key. As a result, a person who does not have the secret key, can't recompute the hash value, and any attempt to forge the data won't go undetected.

    Mediacrypt.IDcypher includes two MAC components: Hmac, which implements hash function-based MAC, and Cmac, which implements block cipher-based MAC.

    Learn more »

'In business, having the right information at the right time can make the difference between profit and loss, success and failure.'

  • Confidentiality: protecting information from unauthorised disclosure;

    Integrity: protecting information from unauthorised modifications, and ensure that information is accurate and complete;

    Availability: ensuring information is available when needed;

    The three pillars of Information Security.

    Learn more »

Mediacrypt.IDcypher v2016.2.517.45

Mediacrypt - Internet, Multimedia, Wireless Communications and CRM systems - Highly secure encryption systems, Military Grade Encryptionv2016.2.517.45

  • Mediacrypt.IDcypher Library (High Performance Multi-Threaded, Military Grade Encryption, Patent pending Key Management).

    IDcypher and the IDcypher logo are registered trademarks of Trust 47 Fund (Registration Number: 302016000012990).

    Developers are able to create spectacularly powerful applications, which transform everyday life for individuals, but when a company's assets or reputation are on the line the stakes become much higher. In the information age and in the interdependent digital economy that is driving globalization and progress today, protecting a company?s sensitive files in any way possible is the key to survival. There are competitors who are willing to try almost any means to get at your data, and one of the most damaging breaches that a company can suffer is that of intellectual property that has been painstakingly developed and perfected being appropriated or misused at the hands of a competitor.

    Learn more »

Get started today with a free, full version of our Software!

  • 1. Download the Source Code Package and Unpack it |
  • 2. Compile it|
  • 3. Use right away

Mediacrypt.CRM for companies v5.3.2.0

  • icon


  • icon


  • icon


icon Features at a glance

icon Very powerful options built right in

Mediacrypt CRM is ideal for "project-based" companies and small businesses. Our CRM is "project-oriented". Create projects, assign tasks, set deadlines. Group projects by company or contact.

The features you get with our small business CRM:

  • CRM keeps a database of Companies you do business with, Contacts (people from these companies or individuals) and Projects that you run;
  • Message-log that keeps a list of notes, interaction-records, files for every company, contact or project in the CRM system;
  • File-attachments;
  • Upcoming tasks for companies, contacts and projects in the CRM software;
  • Email-integration - send your emails right from the CRM system. And optionally intercept incoming emails and log them in the message-log;
  • Unlimited - we are not priced "per seat" unlike our competitors.
Learn more »

Get started today!