Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
-
Updated
Jul 2, 2020 - Python
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
NIST LWC Hardware Reference Implementation of Ascon v1.2
Verilog Hardware Design of Ascon
🔒 Use your Trezor device to symmetrically encrypt and decrypt files
Enyo is a lightweight multistage partition-based encryption algorithm. Enyo cipher demonstrates good resistance to a brute-force attack. It is well suited for small-scale applications where the computational power is a bottleneck.
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.
Python Program to encrypt Strings and Files using End-to-End Asymmetric & Symmetric Encyption
Using machine learning for crypto analysis
Implementation of various symmetric key encryption systems like AES, DES, triple DES (3 DES), Ceasar cipher, Substitution cipher, Hill cipher
A Steganography software using Ascon and LSB written in Python
A DNA encryption algorithm based on a symmetric key encryption combined with a genetic algorithm
This repository contains tools for encrypting and decrypting any file using a hybrid encryption method, making use of symmetric AES 256 and asymmetric RSA encryption.
Program that encrypts plaintext and (attempts) to decrypt ciphertexts, encrypted via a mono-alphabetic substitution cipher. Replaces letters based on frequency / n-gram analysis. Tried to incorporate hill-climbing algorithm by measuring the fitness of resulting texts to find the best key.
End-to-End Encryption with Python Socket Communication This Python project demonstrates end-to-end encryption (E2EE) using the x25519 key exchange protocol and AES encryption for secure communication between a client (Alice) and a server (Bob) over a socket connection.
Practicing Encryption/Decryption Algorithms
🔐 CryptoCut is a cross-platform application to easily encrypt text by highlighting in time; As fast as possible
A Python implementation of the GOST symmetric block cipher.
Assignment-3, CS6500, IIT Madras
Add a description, image, and links to the symmetric-key-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the symmetric-key-cryptography topic, visit your repo's landing page and select "manage topics."