31 skills found · Page 1 of 2
nakov / Practical Cryptography For Developers BookPractical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
secworks / AesVerilog implementation of the symmetric block cipher AES (Advanced Encryption Standard) as specified in NIST FIPS 197. This implementation supports 128 and 256 bit keys.
sveinungkb / Encrypted UserprefsA slightly less insecure wrapper for SharedUserPreferences for Android. Keys and values encrypted using a symmetric cipher.
pwang00 / Cryptographic AttacksRepository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.
johnwheeler / LockboxUser-friendly CLI over cryptography.io's symmetric cipher
libtom / LcryptSymmetric ciphers, hashes, microtime, random strings, big integers, and zlib compression
theashishgavade / SecureFileGuardThis project is all about the Data Security. How we can secure our data from hackers. The symmetric-key block cipher plays an important role in data encryption. It means that the same key is used for both encryption and decryption. The Advanced Encryption Standard (AES) is a widely used symmetric-key encryption algorithm. In this project, we’ll see how to implement AES encryption and decryption using the Python on the any kind of files using pycryptodomex package. Aim and Objective: As we know that today hackers are almost at every corner in search of our useful data which can be hacked by them for their different purposes. Even the risk gets doubled when come to the data of any country’s government. So, a system or terminology is must require to make that data safe forever by any means during communication. So the main aim of the project is to secure our important data from hackers and keep it safe. 1.2 Problem
tombonner / Blowfish ApiPortable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish.
iDoka / GOST 28147 89Verilog HDL implementation of the GOST 28147-89 — a Soviet and Russian government standard symmetric key block cipher
AntCPLab / Awesome TranscipheringThe repo of "SoK: FHE-Friendly Symmetric Ciphers and Transciphering" (CHES 2025)
furkankahvecii / Traditional CiphersTraditional symmetric cipher algorithms in Java
sheroz / MagmaSymmetric Key Block Cipher "Magma" in Rust
iDoka / GOST R34.12 2015Verilog HDL implementation of the GOST R34.12-2015 — a fresh Russian government standard symmetric key block cipher.
K-Czaplicki / TwoFishTwoFish implementation in python with vector tests.
evpix / Quantum CipherA symmetric cipher written in the V programming language
RGB14 / Implementation For Image Steganography With Modified RSA AlgorithmImage steganography is implemented by replacing image pixels with cipher pixels to hide the existence of the message. To enhance the security, cryptographic algorithm, RSA, has been modified into symmetric keying system to encrypt and decrypt the message into cipher text and vice versa solely for this purpose. The sender will encrypt the message with a key and then embed the cipher text into an image and send the image object via any transmission medium like internet along with the key to the receiver, so that the receiver can extract the cipher text from the image and then decrypt by the key that the sender have sent. The result was satisfactory and fulfilled the purpose but there arose many major issues like, visibility of the cipher pixel in case for low resolution image; data corruption of the cipher text due to noise; limitation of grayscale image only; sender have to send a couple of image for comparison of the pixel data etc. However, noise problem have been challenged with the help of median filter but still there remains many scope to establish this algorithm into a better efficient and optimized one.
mcarpenter / Twofish.rbTwofish symmetric cipher in Ruby
fxxce / Symmetric EncryptionImplementation of various symmetric key encryption systems like AES, DES, triple DES (3 DES), Ceasar cipher, Substitution cipher, Hill cipher
lasercata / KRISA GUI software for message encryption with secure symmetric and asymmetric ciphers.
jkstpierre / SealThe Simple Encryption ALgorithm (SEAL) is a 128-bit symmetric key block cipher