🔓 Differential cryptanalysis attack on the KLEIN block cipher | Chosen Plaintext Attack | Key Recovery
-
Updated
May 13, 2024 - C
🔓 Differential cryptanalysis attack on the KLEIN block cipher | Chosen Plaintext Attack | Key Recovery
MRHS solver - research tool for experimental algebraic cryptanalysis
Cryptanalysis of Elisabeth-4 (ASIACRYPT 2023) -- Practical attack code for a toy variant of the Elisabeth-4 cipher.
Long message attack on 96-bits of sha256 using distributed computing
C-based command-line program designed to break Enigma ciphertext in a ciphertext-only scenario
Implementation and round-reduced preimage attacks on BLAKE2s hash function.
Implementation and round-reduced preimage attacks on BLAKE-256 hash function.
C implementation of the Vigènere cipher and the attack on it using Kasiski examination and frequence analysis
"Solving an alchemical cipher in a shared notebook of John and Arthur Dee"
Program for finding low gate count implementations of S-boxes.
Performs key-recovery attacks on the SoDark family of algorithms.
This repository contains C and/or C++ implementations for finding Local Collision Conforming Message Pairs through Differential Attack on Reduced-Round SHA-256 up to 24 Rounds. Also, this repository contains the C++ implementations of SHA-256, SHA-512 and SHA-384.
A simple cryptanalysis tool for the Vigenere cipher.
Decrypting a caeser cipher without a key using basic Cryptanalysis.
Optimized Collision Search for STARK-Friendly Hash Challenge Candidates
Cryptology exercices from Matasano Challenges: https://cryptopals.com
Add a description, image, and links to the cryptanalysis topic page so that developers can more easily learn about it.
To associate your repository with the cryptanalysis topic, visit your repo's landing page and select "manage topics."