Implementation of various symmetric key encryption systems like AES, DES, triple DES (3 DES), Ceasar cipher, Substitution cipher, Hill cipher
-
Updated
Dec 12, 2022 - Python
Implementation of various symmetric key encryption systems like AES, DES, triple DES (3 DES), Ceasar cipher, Substitution cipher, Hill cipher
poor man's homophonic substitution cipher
This is an implementation of all famous cryptography algorithms in python. There are several algorithm of cipher in this like Caesar, Transposition, Substitution, Vigenere, AES and RSA
A script for decrypting text encrypted with monoalphabetic/simple substitution ciphers using combined pattern deduction.
Program that encrypts plaintext and (attempts) to decrypt ciphertexts, encrypted via a mono-alphabetic substitution cipher. Replaces letters based on frequency / n-gram analysis. Tried to incorporate hill-climbing algorithm by measuring the fitness of resulting texts to find the best key.
This repository implements a variety of cryptographic methods and methods of breaking them
Implimentation of Extended Substitution Cipher
Implementation of Cryptographic Algorithms of course Modern Cryptography(CSC049P1M) offered in IIT Jammu.
Ideograph Cipher - A way of encrypting text using Kanji and Kana. (Proof of Concept)
Some Cryptographic Algorithms written in python3
📜 A tool to encrypt, decrypt & crack texts with a substitution cipher
Goal is to make script that archive every cipher algorithm and give users a demo of how they work
Encryptor, decryptor, encoder and decoder with implemented collection of cryptography and encoding algorithms and CLI interface
The Al Bhed are a tribe of technologists in Final Fantasy X and Final Fantasy X-2. Making up ten percent of the Spiran population, they have a unique language and, unlike the other races in Spira, use machina (technology).
MULTIPLE SUBSTITUTION ENCRYPTION Chiffrement de texte par substitution + obscurcissement
A python program which shuffles texts into unreadable words using a substitution cipher.
Demonstration of some attacks exploiting security vulnerabilities of websites and OSs as tasks of Computer Security LAB, CSE 406 in Level-4, Term-1 of CSE, BUET
Solving substitution ciphers using Markov Chain Monte Carlo (MCMC)
Basic implementations of well-known cryptographic ciphers and attacks on these ciphers.
Add a description, image, and links to the substitution-cipher topic page so that developers can more easily learn about it.
To associate your repository with the substitution-cipher topic, visit your repo's landing page and select "manage topics."