Go library for Elliptic Curve Cryptography: key exchanges (Diffie-Hellman, Massey-Omura), ECDSA signatures, and Koblitz encoding. Suitable for crypto education and secure systems.
-
Updated
Apr 9, 2024 - Shell
Go library for Elliptic Curve Cryptography: key exchanges (Diffie-Hellman, Massey-Omura), ECDSA signatures, and Koblitz encoding. Suitable for crypto education and secure systems.
Implementation of the SHA-256 cryptographic hash algorithm.
A very useless hashing algorithm based on MD5 that probably has more hash collisions than MD5
Repository containing the artifacts generated in the work "Analysis of eSTREAM Profile II Ciphers for Image Encryption". The files contained herein were developed during the master's degree in Computer Science at the Universidade Federal de Lavras.
Jumble - Cryptographic Tools Android Application
Python implementation of format preserving encryption defined as a NIST draft (FF1, FF3-1)
A collection of different cryptographic algorithms and ciphers, including the maths behind each algorithm. This is an ongoing project that will be added to over time, with the aim of providing a comprehensive resource for learning about cryptography. The project includes both the code for the algorithms and explanations of how they work.
RSA assymetric criptography. Quick implementation in C++.
This is an encryption and decryption algorithm based on randomly generated integers
Implementation of Chou-Orlandi Oblivious Transfer protocol
The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for secret communications while exchanging data over a public network using the elliptic curve to generate points and get the secret key using the parameters.
JavaScript library for Elliptic Curve Cryptography: key exchanges (Diffie-Hellman, Massey-Omura), ECDSA signatures, and Koblitz encoding. Suitable for crypto education and secure systems.
It is our first minor project, where we developed a secure multithreaded messaging application in Java, integrating socket programming with encryption techniques to ensure secure and reliable peer-to-peer communication.
Implementation of IM-DSSE framework
A proof of concept for the CRIME attack for the course COL759-Cryptography (Spring 2020), IIT Delhi
Here, I have made a very easy to use steganography tool. It allows for parties to communicate(bi-directionally) openly/publicly in "plain sight" but would only appear as the transferring of digital photos at fist glance. But, "hidden data" is actually embedded within the images. This tool allows for both extracting data from digital images as we…
Common cryptographic algorithms written in Python
Add a description, image, and links to the cryptographic-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the cryptographic-algorithms topic, visit your repo's landing page and select "manage topics."