Implementation of Cryptographic Algorithms : RSA, AES, SHA-2
-
Updated
Feb 8, 2017 - Python
Implementation of Cryptographic Algorithms : RSA, AES, SHA-2
Python - Text Encoding Software
The ApoCLypse Bitcoin Miner
Disk Image file recovery using python.
A voting system that provides confidentiality to the voters and lets them cast a vote with utmost privacy. It also audits the casted votes for integrity and checks for immutability to bring transparency to the election system.
Hash table attacks based on birthday attack
Generic version of SHA-256 except with it's own algorithm.
This project Ensures secure encryption and decryption of plaintext to secure cyphertext and vice-versa using AES Encryption. And maintains a secure connection between client and server using the RSA algorithm.
A demonstration of the SHA-256 algorithm with data stored as binary strings.
Proof of Work Cryptocurrency written in Python.
This is a simple application on hashing password using python pycryptodome and also have an implementation of dictionary attack prevention
Simple Image Sharing, But Secured
The motive is to create a NFT using fungibles such as hair, sunglass etc. to create unique and non-recurring images with token Id embedded inside it to provide uniqueness. The user now creates a blockchain based on the username and file name with username encrypted using SHA-256 encryption which will mine a block and attach the block using previ…
🔐🧂💻 Cryptography Final Project to create an fintech application. We use SHA-256 and salt, AES-128, LSFR , and 2 FA security that uses Google Authenticator
SHA-256 implemented in python using arrays of integers representing individual bits
A library for handling passwords and hashes
Encryptor made with Python
Add a description, image, and links to the sha-256 topic page so that developers can more easily learn about it.
To associate your repository with the sha-256 topic, visit your repo's landing page and select "manage topics."