Elliptic Curve Cryptography and Common Public Key Cryptography Implementations
-
Updated
Oct 28, 2023 - Jupyter Notebook
Elliptic Curve Cryptography and Common Public Key Cryptography Implementations
MSc Module
👻 Post-quantum cryptography for Python.
A Rust implementation of CPace, a balanced PAKE.
The aim is to allow Alice and Bob to generate a secure private key that can be used for the one-time pad without having to meet privately.
This repository offers a thorough explanation of the Diffie-Hellman export grade attack, accompanied by a demo.
🤝 Mutually authenticating key agreement to establish shared secrets over an insecure channel.
An encryption/decryption algorithm based on Lorenz's Strange Attractor
Easily generate a single or multi-round Diffie-Hellman key.
Joux's tripartite key-exhange using curve BLS12-381
Simple project which aimed to implement the signal protocol in go, it was abandoned.
Implementation of the Diffie-Hellman key exchange in Ada.
A didactic simulation of the X3DH (Extended Triple Diffie-Hellman) protocol for secure key exchange between Alice and Bob, implemented using Docker. This project provides both automatic and interactive modes explore the cryptographic protocol step-by-step. This project was developed as part of the Network Security exam at the University of Verona
A Python example of Diffie-Hellman key exchange.
Public Key Name System Framework for Key Exchange in Peer-To-Peer and centralised servers.
Diffie-Hellman message encryption and decryption algorithm
Tested, cross-platform Python 3 bindings for the NewHope key exchange mechanism supporting both NewHope1024-CPA-KEM and NewHope1024-CCA-KEM.
A few examples used in Cryptography, as a Winform or Console Application.
Encryption using RSA encryption algorithm
Add a description, image, and links to the key-exchange topic page so that developers can more easily learn about it.
To associate your repository with the key-exchange topic, visit your repo's landing page and select "manage topics."