Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher
-
Updated
Jul 16, 2021 - Jupyter Notebook
Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher
This is an implementation of all famous cryptography algorithms in python. There are several algorithm of cipher in this like Caesar, Transposition, Substitution, Vigenere, AES and RSA
ENCODE-ME is a website where one can use various classical cryptography algorithms all in a single website.
Security Package is a package that includes several security modules - Ciphers, Image Encryption and Decryption, Audio Encryption and Decryption, Steganography, Background Removal, OTP Generation and Authentication.
Cryptographic application in C#
A repository which contains the implementation of Ceasers Cipher which is a very basic and most common data encryption Technique in C++.
A side project developed for Experiment 2 of Security Lab, Design & implementation of a product cipher using substitution and transposition Ciphers. The link to the website is given below. Have fun!
Vigenère cipher, keyed Vigenère cipher and autokey cipher. Single and double columnar transposition ciphers. Cryptanalysis of the Vigenère cipher. Data Structures and Algorithms Lab, summer 2018 (offered by Bachelor's Programme in Computer Science, University of Helsinki).
Myszkowski Transposition using Python.
Solving a combination of substitution cipher and transposition cipher (on the same cipher text)
Transposition cipher implementation for ASCII characters.
Encryption and decryption using symmetric-key substitution and transposition algorithms implemented as C# Windows Form application
Application for encrypting and decrypting text
Implements basic cryptography functions for a security project
CryptoLearn
hexadecimal transposition cipher for shuffle and reverse shuffling hex encoded cipher text
Criptografia basica de transposição, usada de forma analogica pelo exercito brasileiro
Implementation of classcial ciphers using SageMath as part of Number Theory and Cryptography course (CS4021D) at NIT Calicut.
Breaking transposition cipher using metaheuristic algorithms
Fundamentals of software security encryption algorithm using java
Add a description, image, and links to the transposition-cipher topic page so that developers can more easily learn about it.
To associate your repository with the transposition-cipher topic, visit your repo's landing page and select "manage topics."