Skip to content

Latest commit

 

History

History
462 lines (392 loc) · 24.7 KB

cryptography.md

File metadata and controls

462 lines (392 loc) · 24.7 KB

Bookmarks tagged [cryptography]

https://github.com/cotag/ts-md5

Type Script MD5 implemenation


https://github.com/brix/crypto-js

JavaScript library of crypto standards. Contribute to brix/crypto-js development by creating an account on GitHub.


http://bcrypt.sourceforge.net/

A cross platform file encryption utility. Encrypted files are portable across all supported operating systems and processors. [BSD]


http://beecrypt.sourceforge.net/

A portable and fast cryptography library. [LGPLv2.1+]


http://botan.randombit.net/

A crypto library for C++. [BSD-2]


https://github.com/weidai11/cryptopp

A free C++ class library of cryptographic schemes. [Boost] website


https://github.com/kerukuro/digestpp

C++11 header-only message digest (hash) library. [PublicDomain]


https://www.gnupg.org/

A complete and free implementation of the OpenPGP standard. [GPL]


http://www.gnutls.org/

A secure communications library implementing the SSL, TLS and DTLS protocols. [LGPL2.1]


http://www.gnu.org/software/libgcrypt/

A general purpose cryptographic library originally based on code from GnuPG. [LGPLv2.1+]


http://www.libressl.org/

A free version of the SSL/TLS protocol forked from OpenSSL in 2014. [?]


https://github.com/jedisct1/libsodium

P(ortable|ackageable) NaCl-based crypto library, opinionated and easy to use. [ISC]


https://github.com/jedisct1/libhydrogen

A lightweight, secure, easy-to-use crypto library suitable for constrained environments. [ISC]


https://github.com/libtom/libtomcrypt

A fairly comprehensive, modular and portable cryptographic toolkit. [WTFPL]


https://github.com/ARMmbed/mbedtls

An open source, portable, easy to use, readable and flexible SSL library, previously known as PolarSSL. [Apache2] website


http://www.lysator.liu.se/~nisse/nettle/

A low-level cryptographic library. [LGPL]


https://github.com/openssl/openssl

A robust, commercial-grade, full-featured, and Open Source cryptography library. [Apache] website


https://github.com/MaciejCzyzewski/retter

A collection of hash functions, ciphers, tools, libraries, and materials related to cryptography.


https://github.com/awslabs/s2n

An implementation of the TLS/SSL protocols. [Apache]


https://github.com/cr-marcstevens/sha1collisiondetection

Library and command line tool to detect SHA-1 collision in a file. [MIT]


https://github.com/google/tink

A multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. [Apache-2.0]


https://github.com/kokke/tiny-AES-c

Small portable AES128/192/256 in C. [PublicDomain]


https://github.com/briansmith/ring

Safe, fast, small crypto using Rust and BoringSSL's cryptography primitives.


https://github.com/briansmith/webpki

Web PKI TLS X.509 certificate validation in Rust.


https://github.com/brycx/orion

This library aims to provide easy and usable crypto. 'Usable' meaning exposing high-level API's that are easy to use and hard to misuse. [<img src="https://api.travis-ci.org/brycx/orion.svg?branch=mas...


https://github.com/ctz/rustls

A Rust implementation of TLS


https://github.com/DaGenix/rust-crypto

cryptographic algorithms in Rust


https://github.com/sodiumoxide/sodiumoxide

libsodium bindings


https://github.com/doublify/libblockchain

A Blockchain implementation


https://github.com/klutzy/suruga

A Rust implementation of TLS 1.2


https://github.com/libOctavo/octavo

Modular hash and crypto library in Rust


https://github.com/RustCrypto/hashes

Collection of cryptographic hash functions written in pure Rust


https://github.com/rustindia/mpw-rs

Pure Rust implementation of the Master Password password manager


https://github.com/Fraunhofer-AISEC/rabe

Library providing several Attribute-Based Encryption (ABE) schemes


https://github.com/racum/rust-djangohashers

A Rust port of the password primitives used in the Django Project. It doesn't require Django, only hashes and validates passwords according to its style. [<img src="https://api.travis-ci.org/Racum/rus...


https://github.com/RNCryptor/rncryptor-rs

Pure Rust implementation of the RNCryptor AES file format


https://github.com/sfackler/rust-native-tls

Bindings for native TLS libraries


https://github.com/sfackler/rust-openssl

OpenSSL bindings


https://github.com/kornelski/rust-security-framework

Bindings for Security Framework (OSX native crypto)


https://github.com/steffengy/schannel-rs

Bindings for Schannel (Windows native TLS)


https://github.com/zebradil/rustotpony

CLI manager of one-time password generators aka Google Authenticator (TOTP)


https://cryptography.io/en/latest/

A package designed to expose cryptographic primitives and recipes to Python developers.


https://github.com/paramiko/paramiko

A Python (2.6+, 3.3+) implementation of the SSHv2 protocol, providing both client and server functionality.


https://passlib.readthedocs.io/en/stable/

Secure password storage/hashing library, very high level.


https://github.com/pyca/pynacl

Python binding to the Networking and Cryptography (NaCl) library.


https://github.com/sobolevn/awesome-cryptography#readme

A curated list of cryptography resources and links. - sobolevn/awesome-cryptography


https://github.com/pFarb/awesome-crypto-papers#readme

A curated list of cryptography papers, articles, tutorials and howtos. - pFarb/awesome-crypto-papers


https://tools.ietf.org/html/rfc7515

Abstract

JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and id...


https://tools.ietf.org/html/rfc7517

Abstract

A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure th...


https://en.wikipedia.org/wiki/Public_key_fingerprint

In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public k...


https://en.wikipedia.org/wiki/Key_escrow

Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party...


https://tools.ietf.org/html/rfc5280

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


https://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx

Probably the best article to understand public key cryptography


http://www.crypto-it.net/eng/index.html

All you need to know about cryptography. Master ciphers and IT security with Crypto-IT website.


http://niels.nu/blog/2016/java-rsa.html

Shows with Java examples the following:


https://www.youtube.com/watch?v=sEkw8ZcxtFk&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7&index=5

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used...


https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7

A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial tran...


https://stackoverflow.com/questions/18257185/how-does-a-public-key-verify-a-signature/39210591#39210...

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

https://www.giac.org/paper/gsec/634/weakness-modern-cryptography/101458

Modern cryptography has become the savior of the Internet, promising to secure our most important information and communications by guarantying it may be not be deciphered by any other than the intend...


https://www.sans.org/reading-room/whitepapers/vpns/randomness-entropy-introduction-874

This paper will attempt to bring together information pertaining to concepts and definitions of randomness and entropy. Through definition and example both the implications and applications within the...


https://www.youtube.com/watch?v=wXB-V_Keiu8

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation and time complexity.


https://www.youtube.com/watch?v=AQDCe585Lnc

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain this in plain English... Nice explanation


https://en.wikipedia.org/wiki/Scrypt

In cryptography, scrypt (pronounced "ess crypt"[1]) is a password-based key derivation function created by Colin Percival, originally for the Tarsnap online backup service.[2] The algorithm was specif...


https://en.wikipedia.org/wiki/Cryptographic_nonce

In cryptography, a nonce is an arbitrary number that can only be used once.


[Journey into cryptography | Computer science | Computing |

Khan Academy](https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt) https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt

Modern cryptography

A new problem emerges in the 20th century. What happens if Alice and Bob can never meet to share a key in the first place?