symmetric-key-cryptography
There are 165 repositories under symmetric-key-cryptography topic.
xtaci/kcp-go
A Crypto-Secure Reliable-UDP Library for golang with FEC
mithi/simple-cryptography
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
billbuchanan/esecurity
MSc Module
RobertoFalconi/MinimalAPIsTemplate
Complete ASP.NET Core Web APIs template with lot of examples: OpenAI APIs, OAuth 2.0 Authentication, JSON Web Algorithms and Bearer Tokens (JWA, JWT, JWS, JWE), HMAC symmetric key, RSA X509 certificate asymmetric key, AES encryption, CQRS, DDD, MediatR, Dapper, Docker, Entity Framework, Fluent Validation, GZip, Hangfire, NLog, REST CRUD, Swagger...
oceans404/wallet-otp
Wallet OTP provides 2FA for any web2 or web3 service on any device by generating one time passwords protected with wallet encryption
ascon/ascon-hardware
NIST LWC Hardware Reference Implementation of Ascon v1.2
luke-park/SwiftGCM
An implementation of Galois/Counter Mode for Swift 4.0.
rprimas/ascon-verilog
Verilog Hardware Design of Ascon
8go/TrezorSymmetricFileEncryption
:lock: Use your Trezor device to symmetrically encrypt and decrypt files
FloTheSysadmin/VSHG
A standalone addon for GnuPG
MK-Ware/CryptoKnight
CryptoKnight is a general purpose cryptography desktop app
TonyKaravasilev/CryptoManana
An Advanced PHP Cryptography Framework
gsurma/diffie_hellman_key_exchange
Swift implementation of classic cryptographic key exchange method.
hadipourh/zeroplus
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
apratimshukla6/enyo
Enyo is a lightweight multistage partition-based encryption algorithm. Enyo cipher demonstrates good resistance to a brute-force attack. It is well suited for small-scale applications where the computational power is a bottleneck.
hadipourh/zero
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
Anish-M-code/simple-gpg
A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.
GlitchedPolygons/pwcrypt
Encrypt strings and files symmetrically using Argon2id key derivation + AES-256 (GCM) or ChaCha20-Poly1305.
ivansarno/IDEA-cipher
IDEA cryptography algorithm
imabhisht/Python-Asymmetric-Encryption-End-to-End
Python Program to encrypt Strings and Files using End-to-End Asymmetric & Symmetric Encyption
rdar-lab/MLCryptoAnalyzer
Using machine learning for crypto analysis
elementmerc/Stegcore
A Steganography software using Ascon and LSB written in Python
fxxce/Symmetric-Encryption
Implementation of various symmetric key encryption systems like AES, DES, triple DES (3 DES), Ceasar cipher, Substitution cipher, Hill cipher
muhasturk/BMHCrypto
BMHCrypto is a pure Swift packages built on CryptoKit, adds useful extensions and ready to use.
Twilight-Dream-Of-Magic/Algorithm_OaldresPuzzleCryptic
功能名:隐秘的奥尔德雷斯之谜 Function Name: OaldresPuzzle-Cryptic
cluster-labs/ipfs-mfs-crypto
JavaScript implementation of the IPFS Mutable File System supporting out of the box crypto operations
Faris-Abuali/Cryptography-AES-Project
Full Implementation of AES Modules (Advanced Encryption Standard) from scratch, plus encoding and decoding of the message and the resulting cipher blocks
jas-/kruptein
crypto; from kruptein to hide or conceal
maitreyeepaliwal/Encrypting-and-decrypting-data
Symmetric and assymetric
anishvedant/End-to-End-Encryption
End-to-End Encryption with Python Socket Communication This Python project demonstrates end-to-end encryption (E2EE) using the x25519 key exchange protocol and AES encryption for secure communication between a client (Alice) and a server (Bob) over a socket connection.
armankhondker/aVeryFunCryptoService
A Crypto web service that uses symmetric encryption and implements several useful APIs.
0xPandaDev/Simplified_DataEncryption_Standard_SDES
Simplified Data Encryption Standard (S-DES) is a simple version of the DES Algorithm. It is a block cipher that takes a block of plain text and converts it into ciphertext. It takes a block of 8 bit. It is a symmetric key cipher, they use the same key for both encryption and decryption. We take a random 10-bit key and produce two 8-bit keys.
AjayBadrinath/Cryptography
🔐 Collection Of Various Implementations Of Cryptographic Algorithms From Scratch In Various Languages
GaPhil/vpn
Secure TCP port forwarding application; using AES session key, performing secure handshake with X.509 certificates.
shinchancode/Cryptography
Cryptography project : Implemented using Double layer encryption and decryption using Armstrong numbers and RGB color-based mappings for various types of file format.
Tech-Savvy-Abhishek/Chaotic_Crypto
An academic project developed for IT352 Information Assurance and Security course at NITK Surathkal, implementing a novel chaotic PRNG for secure image encryption. Features include a unique combination of chaotic maps, robust image cipher system, and a user-friendly Flask-based interface for experimentation.