Pinned Repositories
365daysofcode
It is a place to document the problem that I solve daily.
DeterministicRabinCryptosystem
Rabin cryptosytem made deterministic
EmployeeManager-gin-gonic-go
Go-Microservices-pro
itzYubi
PathFinder-GraphAlgorithms
Puzzle-Encryption-Algorithm
The underlying structure of network security mainly consists of encryption algorithms. These algorithms are broadly divided into two categories symmetric encryption algorithm and asymmetric encryption algorithm both having their own pros and cons. In this algorithm the sender and the receiver receive the same key which is why it symmetric encryption approach . The objective of the paper is to delineate the security of the algorithm. The strength of the algorithm is tested by using various cryptanalytic attacks such as Linear, Brute force, Differential, Differential-linear Crypt-analysis. The scrupulous juxtaposition of the puzzle encryption with the Advanced Encryption Standard (AES) which is yet another method to encrypt data, is a vital ground for exegesis. The algorithm has some interesting properties: Variable block size, Key size is erratic and the algorithm is much faster than the average cryptography function. The algorithm is created while acknowledging the concepts of Confusion and Diffusion and the observable universe. The cryptography is non-linear and is multi-operational on bits as well as bytes.
samsung
Sort.IO
Visual representation of sorting strategies
YuBNB
An anime based bed and breakfast website
itzYubi's Repositories
itzYubi/DeterministicRabinCryptosystem
Rabin cryptosytem made deterministic
itzYubi/itzYubi
itzYubi/Puzzle-Encryption-Algorithm
The underlying structure of network security mainly consists of encryption algorithms. These algorithms are broadly divided into two categories symmetric encryption algorithm and asymmetric encryption algorithm both having their own pros and cons. In this algorithm the sender and the receiver receive the same key which is why it symmetric encryption approach . The objective of the paper is to delineate the security of the algorithm. The strength of the algorithm is tested by using various cryptanalytic attacks such as Linear, Brute force, Differential, Differential-linear Crypt-analysis. The scrupulous juxtaposition of the puzzle encryption with the Advanced Encryption Standard (AES) which is yet another method to encrypt data, is a vital ground for exegesis. The algorithm has some interesting properties: Variable block size, Key size is erratic and the algorithm is much faster than the average cryptography function. The algorithm is created while acknowledging the concepts of Confusion and Diffusion and the observable universe. The cryptography is non-linear and is multi-operational on bits as well as bytes.
itzYubi/Sort.IO
Visual representation of sorting strategies
itzYubi/PathFinder-GraphAlgorithms
itzYubi/Banking
A simple banking Program for at home coding round
itzYubi/ContactManager-Spring-mvc-heroku
Spring boot App made for contact management. Made using spring mvc, hibernate, sts4, PostgreSQL and deployed on Heroku.
itzYubi/EmployeeManager-gin-gonic-go
itzYubi/samsung
itzYubi/Yubi-portfolio
itzYubi/365daysofcode
It is a place to document the problem that I solve daily.
itzYubi/Go-Microservices-pro
itzYubi/YuBNB
An anime based bed and breakfast website
itzYubi/A-possible-Deterministic-Rabin-Cryptosystem
COMING SOON!!
itzYubi/Anime-Finder
itzYubi/JavaSpringHibernateModules
itzYubi/Sunshine-girl