mithi / Simple Cryptography
Licence: mit
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Stars: ✭ 40
Programming Languages
python
139335 projects - #7 most used programming language
Projects that are alternatives of or similar to Simple Cryptography
Cryptomator
Multi-platform transparent client-side encryption of your files in the cloud
Stars: ✭ 6,623 (+16457.5%)
Mutual labels: cryptography, crypto
Acra
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+1715%)
Mutual labels: cryptography, crypto
Rando.js
The world's easiest, most powerful random function.
Stars: ✭ 659 (+1547.5%)
Mutual labels: cryptography, crypto
Libsodium Php
The PHP extension for libsodium.
Stars: ✭ 507 (+1167.5%)
Mutual labels: cryptography, crypto
Crypton
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+2387.5%)
Mutual labels: cryptography, crypto
Securefs
Filesystem in userspace (FUSE) with transparent authenticated encryption
Stars: ✭ 518 (+1195%)
Mutual labels: cryptography, crypto
Maskbook
The portal to the new, open internet. ([I:b])
Stars: ✭ 691 (+1627.5%)
Mutual labels: cryptography, crypto
Elle
The Elle coroutine-based asynchronous C++ development framework.
Stars: ✭ 459 (+1047.5%)
Mutual labels: algorithm, cryptography
Aeternity
æternity: solving scalability problems by making sense of state-channels
Stars: ✭ 923 (+2207.5%)
Mutual labels: cryptography, crypto
Iotex Core
Official implementation of IoTeX blockchain protocol in Go.
Stars: ✭ 505 (+1162.5%)
Mutual labels: cryptography, crypto
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+2090%)
Mutual labels: cryptography, crypto
Securitydriven.inferno
✅ .NET crypto done right. Professionally audited.
Stars: ✭ 501 (+1152.5%)
Mutual labels: cryptography, crypto
Diffie Hellman backdoor
How to backdoor Diffie-Hellman
Stars: ✭ 559 (+1297.5%)
Mutual labels: cryptography, crypto
Rsa And Lll Attacks
attacking RSA via lattice reductions (LLL)
Stars: ✭ 482 (+1105%)
Mutual labels: cryptography, crypto
Libsodium.js
libsodium compiled to Webassembly and pure JavaScript, with convenient wrappers.
Stars: ✭ 665 (+1562.5%)
Mutual labels: cryptography, crypto
Snow
A Rust implementation of the Noise Protocol Framework
Stars: ✭ 436 (+990%)
Mutual labels: cryptography, crypto
Capillary
Capillary is a library to simplify the sending of end-to-end encrypted push messages from Java-based application servers to Android clients.
Stars: ✭ 445 (+1012.5%)
Mutual labels: cryptography, crypto
Virgil Crypto Php
Virgil PHP Crypto Library is a high-level cryptographic library that allows you to perform all necessary operations for secure storing and transferring data and everything required to become HIPAA and GDPR compliant.
Stars: ✭ 22 (-45%)
Mutual labels: cryptography, crypto
Simon Speck C
example C language implementation of SIMON and SPECK lightweight block ciphers.
Stars: ✭ 9 (-77.5%)
Mutual labels: cryptography, crypto
🐳 ☕️
About
- Python scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more
- Each has tests, notes and detailed explanations in the hopes that you can clearly understand what's happening
- The references section of this README links to awesome websites you can use for learning cryptography
Many Time Pad
1.- This script will be able to decrypt a target ciphertext, given a bunch on intercepted ciphertexts encrypted with the same key (which may or may not have random errors). A stream cipher key should never be used more than once.
Block Ciphers
2.- You'll be able to encrypt or decrypt a message given a key using two modes of block cipher operations; CBC mode and CTR mode.
Simple File Authentication System
3.- A simple file authentication system that simulate how you'd be able to authenticate and play video chunks as they are downloaded without having to wait for the entire file.
Padding Oracle Attack
4.- This script illustrates how you'd be able to decrypt an intercepted ciphertext if the receiver reveals whether a sent ciphertext is of valid format or not.
Meet In the Middle Attack
5.- The meet-in-the-middle attack (MITM) is a generic space–time tradeoff cryptographic attack. We demonstrate the MITM attack by using it to solve a discrete log problem.
Factoring Challenges
6.- RSA can be broken when the public modulus
N
is generated incorrectly. These scripts illustrate how you'd be able to factorN
whenp
andq
are close to each other.
Basic RSA
7.- An example pipeline that demonstrates basic RSA encryption and decryption.
References
- ❤️ Crypto Hack
- Coursera Cryptography I, Stanford, Dan Boneh
- A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup
- Crypto 101 by Laurens Van Houtven
- Crypto Pals Crypto Challenges
🐳 ☕️
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].