Skip to content

This repository contains implementations and demonstrations of various cryptographic algorithms. It serves as a practical guide for a Cryptography. The lab plan covers a range of topics, from symmetric-key encryption to advanced protocols and attacks.

License

Notifications You must be signed in to change notification settings

Dhriti143/Cryptography-Guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cryptography Practical Guide

This repository contains implementations and demonstrations of various cryptographic algorithms. It serves as a practical guide for a Cryptography. The lab plan covers a range of topics, from symmetric-key encryption to advanced attacks.

Lab Overview

  1. S-DES Implementation
  • Code for the Simplified Data Encryption Standard (S-DES).
  • Usage instructions and example scenarios.
  1. Bruteforce Attack on S-DES
  • Application of a bruteforce attack on S-DES.
  • Explanation of the attack and countermeasures.
  1. Extended Euclidean Algorithm
  • Implementation and application of the Extended Euclidean Algorithm.
  1. RSA Implementation
  • Implementation of the RSA cryptographic algorithm, including key generation, encryption, and decryption examples.
  1. CCA2 Attack on RSA
  • Demonstration of a Chosen Ciphertext Attack (CCA2) on RSA, along with discussions on preventive measures.
  1. Elgamal Algorithm for Encryption
  • Implementation of the Elgamal Algorithm for encryption.
  1. Elgamal Algorithm for Digital Signature
  • Implementation of the Elgamal Algorithm for digital signatures, including the verification process and security considerations.
  1. Pseudorandom Number Generation
  • Implementation of a custom-designed pseudorandom number generation algorithm, accompanied by an explanation of design principles.
  1. Shamir Secret Sharing Scheme
  • Implementation and usage of the Shamir Secret Sharing Scheme.
  1. Elgamal for Digital Signature
  • Utilizing Elgamal for generating digital signatures, providing example use cases and discussing security considerations.

Usage

Clone the repository: git clone https://github.com/Dhriti143/Cryptography-Guide.git Follow the individual directories for specific implementations. Each directory contains code, explanations, and examples for the respective lab topic.

Contribution

Contributions are welcome! If you find issues or have enhancements, please open an issue or create a pull request.

License

This project is licensed under the MIT License. See the LICENSE.md file for details.

About

This repository contains implementations and demonstrations of various cryptographic algorithms. It serves as a practical guide for a Cryptography. The lab plan covers a range of topics, from symmetric-key encryption to advanced protocols and attacks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages