Skip to content

Latest commit

 

History

History
71 lines (48 loc) · 2.94 KB

README.md

File metadata and controls

71 lines (48 loc) · 2.94 KB

PyCryptography

A personal project for offline cryptography tools

To do list:

  1. Caesar Cipher : A simple su tution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

usage :

encryption

>>> python caesar.py -e -k 13 -m "Elliot hacks"
Encrypted Message:
RYYVBG UNPXF                                                                                                                            

decryption

>>> python caesar.py -d -k 13 -m "RYYVBG UNPXF"
Decrypted Message:
ELLIOT HACKS

brute-force

>>>python caesar.py --brute --message "HOOLRW KDFNV"       
Brute-force decryption results:
Key 0: HOOLRW KDFNV
Key 1: GNNKQV JCEMU
Key 2: FMMJPU IBDLT
Key 3: ELLIOT HACKS
  1. Brainfuck: Brainfuck is a minimalist and esoteric programming language created by Urban Müller in 1993.

usage :

decryption

>>>python brainfuck.py -d "++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>-.>++++++++..---.++++++.+++++.<<++.>+++.>-------------------.++.++++++++.++++++++."
Decrypted Plaintext:
Elliot Hacks
  1. Reverse cipher: Rearranges statements in reverse order

usage :

>>>python reverse.py "Hello friend"
Reversed Message:
dneirf olleH
  1. Transposition cipher : Involves rearranging the letters in the plaintext to form the ciphertext.

usage :

>>>python transposition.py -m "Elliot hacks.Am I right?" -k 3
Ei c. rhlohkAIitltasm g?|
  1. Vigenère Cipher : A more advanced substitution cipher that uses a keyword to determine the shifting amount for each letter.

  2. Substitution cipherer : Involves rearranging each letter in the plaintext with a corresponding letter or symbol in the ciphertext.

  3. RSA Encryption : A public-ke cryptosystem that involves generating a public and private key pair for secure communication.

  4. AES Encryption : A symmetric encryption algorithm used to secure sensitive data.

  5. Hill Cipher A polygraph substitution cipher that uses linear algebra for encryption and decryption.

  6. Diffie-Hellma y Exchange : A method for other parties to agree on a shared secret key over an unsecured communication channel.

  7. SHA-256 Hashing : A cryptogra hash function that produces a fixed-size output (256 bits) from an input.

  8. Simple XOR Encryption : An XOR-base cryption method that involves bitwise operations.

  9. One-Time Pad: A theoretic unbreakable encryption method that uses a random key as long as the message.

  10. Playfair Cipher : A digraphic stitution cipher using a 5x5 matrix of letters.

  11. Rail Fence Cipher: A transposition cipher that rearranges the letters in a zigzag pattern.

  12. Autokey Cipher : A substitution cipher that uses the plaintext itself to generate part of the key for encryption.

  13. Columnar Transposition Cipher : A transposition cipher where the columns are rearranged based on a keyword.