/cryptography

Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.

Primary LanguageJupyter NotebookMIT LicenseMIT

Cryptography & Network Security

~Behrouz A. Forouzan

made-with-python

Algorithms from the book Cryptography & Network Security ~Behrouz A. Forouzan. See book 📗 here.

📖 Index

  1. Euclid's Algorithm
  2. Extended Euclid's Algorithm
  3. Diophantine's Equation
  4. Additive Inverse
  5. Multiplicative Inverse
  6. Solutions to Single Variable Linear Equations
  1. Monoalphabetic Ciphers
    1. Caesar Shift Cipher
    2. Multiplicative Cipher
    3. Affine Cipher
  2. Polyalphabetic Ciphers
    1. Autokey Cipher
    2. Playfair Cipher
    3. Vignere Cipher
    4. Hill Cipher
    5. One Time Pad Cipher
  3. Transposition Ciphers
    1. Keyless Transposition Ciphers
      1. Column Transposition Cipher
      2. Row Transposition Cipher
      3. Rail Fence Transposition Cipher
    2. Key Based Transposition Ciphers
      1. Keyed Transposition Cipher
      2. Columnar Transposition Cipher
  1. The Permutation Group
  2. The Galois Field GF(2^n)
  1. P Boxes
  2. Feistel Mixer Cipher
  3. One Round of a Feistel Cipher
  4. Multiple Round Fiestel Cipher
  1. Permutation Box
  2. Substitution Box
  3. Swapper
  4. Mixer
  5. Single Fiestel Round
  6. DES - Data Encryption Standad Algorithm