Found 25 repositories(showing 25)
Aiemu
RSA homework of Applied Cryptography at Tsinghua University.
ryanleh
Solutions to applied cryptography problems from https://id0-rsa.pub/
wonderfulnx
This is the project for the graduate course "Applied Cryptography" 2020. A simple RSA system will be implemented.
Jenson073
This project was designed as a simple exploration of RSA algorithm vulnerabilities, particularly focusing on the factorization problem. It's an excellent example of how web technologies can be applied to explore and demonstrate cryptographic concepts.
Gideon543
No description available
Eliantoree
Applied Cryptography RSA Project
An RSA implementation for my final project of COMP 4109, Carleton University.
violettelai
Applied Cryptography RSA encryption schema implementation
powerfooI
An RSA toolbox, midterm assignment of Applied Cryptography.
kakhishvia
Applied Cryptography Lab - RSA, AES, and TLS Analysis
RalphTan37
Implementing RSA using Large Prime Numbers - CSCI 4870/5870 (Applied Cryptography)
Rutvi-Malaviya
Project for Applied Cryptography & Network Security (CSCI-GA 3205-001) - Building RSA system and digital certificate
akshitaHere
Contains Applied Cryptography projects in C# of the following. Steganography, Cryptanalysis, Hash project, Diffe-Hellman and RSA project.
ShivamAgarwal-348
Scratch Python Implementation of Cryptographic Schemes such as AES, Trivium, Triad(Enc, Mac and Hash) and RSA made during the Applied Cryptography course in IIITD
Freddricklogan
Applied cryptography toolkit with AES-256, RSA, SHA hashing, digital signatures, and steganography — powered by the Web Crypto API
Kulsum416
A collection of Python programs for the Applied Cryptography Lab, including prime numbers, GCD, modular arithmetic, algebraic structures, and RSA fundamentals.
ClaireCassidy
Demonstration of applied public and private key encryption via an app interfacing with Google Drive, using Python, RSA and the cryptography library Fernet
Abisan-s
A basic extendable modular python toolkit implementing applied cryptography ( AES, RSA, password storage, integrity verification) with focus on secure design and real-world usage
Ayushmaan10100
This project demonstrates the implementation of the RSA (Rivest–Shamir–Adleman) cryptographic algorithm using Python. RSA is one of the most widely used public-key cryptography algorithms, primarily applied for secure data transmission. The system enables: Encryption of plaintext using a public key Decryption of ciphertext using a private key .
Ayushmaan10100
This project demonstrates the implementation of the RSA (Rivest–Shamir–Adleman) cryptographic algorithm using Python. RSA is one of the most widely used public-key cryptography algorithms, primarily applied for secure data transmission. The system enables: Encryption of plaintext using a public key Decryption of ciphertext using a private key .
RFeb03
Developed a command-line Rust tool to encrypt and decrypt files using AES-256 for content and RSA for key management, demonstrating applied cryptography and Python integration for batch operations.
sarahalshahranicyber
Developed a GUI-based RSA cryptography tool implementing key generation, encryption/ decryption, and digital signature signing and verification. Applied probabilistic primality testing and key management concepts to demonstrate secure communication and message integrity.
San-Yamin
Crypto Escape Room is a hybrid physical digital escape room designed as a university project for the Applied Cryptography course. The project demonstrates practical cryptographic concepts including classical ciphers, RSA, hashing, and digital signatures through an interactive, story-driven puzzle game built with Python and Flask.
kurtengsig
This was a project I created for my applied cryptography course. It demonstrates potential attacks on RSA encryption using prime numbers which are a very small fraction of real world size numbers. The encryption used in this demonstration is not secure at all.
This report presents a comparative experimental study of the performance of three essential cryptographic algorithms: AES-256, RSA-2048, and SHA-256. The main objective is to quantify and analyze the computational efficiency of these algorithms when applied to data of different sizes, from small blocks to larger files.
All 25 repositories loaded