A Streamlit-based interactive app that generates large primes, compares primality algorithms, and demonstrates real-world RSA encryption and decryption using those primes.
-
Updated
Nov 12, 2025 - Python
A Streamlit-based interactive app that generates large primes, compares primality algorithms, and demonstrates real-world RSA encryption and decryption using those primes.
Repository related to CENG471 course I have taken in IZTECH
HMAC-based key derivation function (HKDF) standalone implementation using pure Python.
Python implementation of format preserving encryption defined as a NIST draft (FF1, FF3-1)
Post-classical cryptographic engine with entropy-regenerative architecture
🔒 Protect your data with CrypticSeal, an intuitive tool for secure file encryption and seamless sharing. Keep your information safe and private.
This is an encryption and decryption algorithm based on randomly generated integers
A proof of concept for the CRIME attack for the course COL759-Cryptography (Spring 2020), IIT Delhi
Implementation and exploration of RSA encryption, including its security properties, practical applications, and real-world use cases. A class project to learn and experiment with cryptographic principles
Here, I have made a very easy to use steganography tool. It allows for parties to communicate(bi-directionally) openly/publicly in "plain sight" but would only appear as the transferring of digital photos at fist glance. But, "hidden data" is actually embedded within the images. This tool allows for both extracting data from digital images as we…
Python code for different cryptographic algorithms
A basic cryptography library written in pure python, possible to use in CTF's
Easy-to-deploy oblivious pseudo-random function (OPRF) service that allows other parties (typically participants in some secure multi-party computation protocol) to obtain a persistent mask which they cannot decrypt but which they can safely apply (via requests to the service) to private data values of their choice.
Common cryptographic algorithms written in Python
The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for secret communications while exchanging data over a public network using the elliptic curve to generate points and get the secret key using the parameters.
This is a voting system based on Azure Blockchain.
Oblivious pseudo-random function (OPRF) protocol functionality implementations based on Curve25519 primitives, including both pure-Python and libsodium-based variants.
Pure python3 implementation of cryptograhic alogrithms
ParallelCryptography harnesses high-performance computing to optimize cryptographic algorithms. Explore our subprojects for parallel encryption, decryption, hashing, and more. Secure your data efficiently with the power of parallel computing.
Laboratory work on cryptographic methods of information protection 👨💻
Add a description, image, and links to the cryptographic-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the cryptographic-algorithms topic, visit your repo's landing page and select "manage topics."