Home Blog
A program to show key exchange using Diffie-Hallman key exchange
The Diffie-Hellman algorithm is being used to establish a shared secret that can be used for secret communications while exchanging data over a public network using the elliptic curve to generate points and get the secret key using the parameters.
Code for encryption and decryption using Data Encryption Standard (DES)
Data Encryption Standard (DES) is a block cypher algorithm that takes the plain text in blocks of 64 bits and converts them to ciphertext using keys of 48 bits. It is a symmetric key algorithm, which means that the same key is used for encrypting and decrypting data.
A program to show encryption and decryption using hill cipher
Based on linear algebra Hill cipher is a polygraphic substitution cipher in cryptography.
Code for encryption and decryption using Vigenère’s Cipher
Vigenere Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets .The encryption of the original text is done using the Vigenère square or Vigenère table.
Code for encryption and decryption through Play-Fair Cipher
Playfair cipher is an encryption algorithm to encrypt or encode a message. It is the same as a traditional cipher.
Code for encryption and decryption through a Mono-Alphabetic cipher
A monoalphabetic cipher scheme is one in which the characters of the plain text are mapped to the ciphertext in a one to one fashion, that is, every occurrence of a character in the plain text is mapped to the same ciphertext character
Code for encryption and decryption using Caesar Cipher algorithm
The Caesar Cipher, also known as a shift cypher, is one of the oldest and simplest forms of encrypting a message.
Real-Time Chat Application with Collaborative Drawing Tools
DrawChat is a web application which allows multiple users to work together and collaborate on a digital whiteboard, as well as chat together
Combined Steganography and Cryptography in Information & Network Security
Transferring digital information and data over the internet is a concern to security and privacy as the data is more susceptible to illegal copying
Meet the Main Advantages of Learning STEM Disciplines
Today, more and more students choose to study STEM disciplines. Check some of the key benefits of choosing this area of study as your major