CryptoKnight is a general purpose cryptography desktop app
-
Updated
Jan 12, 2018 - Java
CryptoKnight is a general purpose cryptography desktop app
Full Implementation of AES Modules (Advanced Encryption Standard) from scratch, plus encoding and decoding of the message and the resulting cipher blocks
A Crypto web service that uses symmetric encryption and implements several useful APIs.
Secure TCP port forwarding application; using AES session key, performing secure handshake with X.509 certificates.
Very simple library based on FramedTCP that provides a fairly secure ecnrypted TCP connection.
Cryptography project : Implemented using Double layer encryption and decryption using Armstrong numbers and RGB color-based mappings for various types of file format.
RSA encryption and decryption app with JavaFX GUI
Twofish ECB block cipher implementation in pure Java. No dependencies.
End to End Encryption between Client to Client interaction through Server using combination of asymmetric and symmetric key encryption
The FlipPadCipher program is an implementation of a custom encryption and decryption algorithm that utilizes the XOR operation combined with binary representations of text and keys.
Encryption/decryption challenges in Computer Security using diverse cryptographic techniques
Highly Dependable Location Tracker System
University Project: A Java class designed to perform DES encryption on files
Benchmark of block ciphers/Программная система для тестирования быстродействия алгоритмов шифрования
Lab exercises in Computer security course about MAC and Digital signature verifications.
Cybersecurity Project - Repositry contains [windows and android] application which uses Symmetric - Encryption for encrypting any file
Assignments for CSCI 6708 - Advanced Network Security
Encrypts & Decrypts an Image based on four most important encryption methods
Application encrypt and decrypt file using symmetric encryption process (AES algorithm).
A program which performs a frequency analysis on a sample of English text and attempts a cipher-attack on polyalphabetic substitution ciphers using 2 famous methods - Kasiski's and Friedman's.
Add a description, image, and links to the symmetric-key-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the symmetric-key-cryptography topic, visit your repo's landing page and select "manage topics."