An open API service indexing awesome lists of open source software.

fucking-awesome-cryptography

A curated list of cryptography resources and links. With repository stars⭐ and forks🍴
https://github.com/Correia-jpv/fucking-awesome-cryptography

Last synced: 6 days ago
JSON representation

  • Theory

    • Algorithms

      • Blowfish - Symmetric-key block cipher, designed in 1993 by Bruce Schneier. Notable features of the design include key-dependent S-boxes and a highly complex key schedule.
      • RSA - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.
      • 3DES - Symmetric-key block cipher (or Triple Data Encryption Algorithm (TDEA or Triple DEA), which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
      • AES - Symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption (also known as Rijndael).
      • DH - A method of exchanging cryptographic keys securely over a public channel. Unlike RSA, the Diffie-Hellman Key Exchange is not encryption, and is only a way for two parties to agree on a shared secret value. Since the keys generated are completely pseudo-random, DH key exchanges can provide forward secrecy (https://en.wikipedia.org/wiki/Forward_secrecy).
      • ECC - Public-key cryptosystems based on the algebraic structure of elliptic curves over finite fields.
      • MD5 - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
      • SHA1 - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
      • SHA2 - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
      • SHA3 - Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic algorithms designed to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.
    • Books

    • Courses

      • Cryptography - Stanford University - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
    • Other lists

    • Articles

  • Frameworks and Libs

    • C

      • themis - High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption). Ported on many languages and platforms, suitable for client-server infastructures.
    • Common Lisp

      • ironclad - Collection of common crypto shortcuts.
    • C++

      • Nettle - Low-level cryptographic library.
    • Delphi

      • SynCrypto - Fast cryptographic routines (hashing and cypher), implementing AES, XOR, RC4, ADLER32, MD5, SHA1, SHA256 algorithms, optimized for speed.
    • Haskell

    • JavaScript

    • Java

      • Flexiprovider - Powerful toolkit for the Java Cryptography Architecture.
      • jbcrypt - jBCrypt is an implementation the OpenBSD Blowfish password hashing
    • Objective-C

      • RNCryptor - CCCryptor (AES encryption) wrappers for iOS and Mac.
    • Swift

      • CryptoSwift - Crypto related functions and helpers for Swift implemented in Swift programming language.
      • IDZSwiftCommonCrypto - Wrapper for Apple's 🌎 [CommonCrypto](opensource.apple.com/source/CommonCrypto/) library written in Swift.
      • SweetHMAC - Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.
      • Swift-Sodium - Swift interface to the Sodium library for common crypto operations for iOS and macOS.
  • Resources

    • Web-tools

      • Cryptolab - is a set of cryptography related tools.
      • factordb.com - Factordb.com is tool used to store known factorizations of any number.
  • Contributing

  • Source