A personal project for offline cryptography tools
Caesar Cipher : A simple su tution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
>>> python caesar.py -e -k 13 -m "Elliot hacks"
Encrypted Message:
RYYVBG UNPXF
>>> python caesar.py -d -k 13 -m "RYYVBG UNPXF"
Decrypted Message:
ELLIOT HACKS
>>>python caesar.py --brute --message "HOOLRW KDFNV"
Brute-force decryption results:
Key 0: HOOLRW KDFNV
Key 1: GNNKQV JCEMU
Key 2: FMMJPU IBDLT
Key 3: ELLIOT HACKS
Brainfuck: Brainfuck is a minimalist and esoteric programming language created by Urban Müller in 1993.
>>>python brainfuck.py -d "++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>-.>++++++++..---.++++++.+++++.<<++.>+++.>-------------------.++.++++++++.++++++++."
Decrypted Plaintext:
Elliot Hacks
Reverse cipher: Rearranges statements in reverse order
>>>python reverse.py "Hello friend"
Reversed Message:
dneirf olleH
Transposition cipher : Involves rearranging the letters in the plaintext to form the ciphertext.
>>>python transposition.py -m "Elliot hacks.Am I right?" -k 3
Ei c. rhlohkAIitltasm g?|
Vigenère Cipher : A more advanced substitution cipher that uses a keyword to determine the shifting amount for each letter.
Substitution cipherer : Involves rearranging each letter in the plaintext with a corresponding letter or symbol in the ciphertext.
RSA Encryption : A public-ke cryptosystem that involves generating a public and private key pair for secure communication.
AES Encryption : A symmetric encryption algorithm used to secure sensitive data.
Hill Cipher A polygraph substitution cipher that uses linear algebra for encryption and decryption.
Diffie-Hellma y Exchange : A method for other parties to agree on a shared secret key over an unsecured communication channel.
SHA-256 Hashing : A cryptogra hash function that produces a fixed-size output (256 bits) from an input.
Simple XOR Encryption : An XOR-base cryption method that involves bitwise operations.
One-Time Pad: A theoretic unbreakable encryption method that uses a random key as long as the message.
Playfair Cipher : A digraphic stitution cipher using a 5x5 matrix of letters.
Rail Fence Cipher: A transposition cipher that rearranges the letters in a zigzag pattern.
Autokey Cipher : A substitution cipher that uses the plaintext itself to generate part of the key for encryption.
Columnar Transposition Cipher : A transposition cipher where the columns are rearranged based on a keyword.