Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
-
Updated
Jul 2, 2020 - Python
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Cracking 2DES using a meet-in-the-middle attack implemented in python 3.
my solutions for the HW in the symmetric cipher breaking course, all the HW are exercises from the https://cryptanex.hideinplainsight.io/ website
Explicación, problemas y soluciones relacionados con el algoritmo meet in the middle.
Go Meet in The Middle Key Cracker
From basic algorithms like Sieve, Bitwise-sieve, Segmnted-sieve, Modular Arithmetic, Big Mod to Primality test, CRT etc. all other advance number theory algorithms.
C implementation of a SHA-1 cracker with various optimizations
Browser-based HiAE threat model case study — AESL, Theorem 1 candidate enumeration, MITM state recovery, byte decomposition, guess-and-determine key recovery. Security claims are contracts. The threat model is the fine print. No backends. No simulated math.
Implémentation du chiffrement PRESENT24, de son déchiffrement et d'une attaque par le milieu sur Double-PRESENT24.
SubsetSum: a study on 'The Subset-Sum Problem'.
Implementation and linear cryptanalysis of a simplified AES-like cipher
Find fair meeting points for N participants — isochrone intersection, venue search, fairness scoring
Add a description, image, and links to the meet-in-the-middle topic page so that developers can more easily learn about it.
To associate your repository with the meet-in-the-middle topic, visit your repo's landing page and select "manage topics."