An open API service indexing awesome lists of open source software.

awesome-cryptography

A curated list of cryptography resources and links.
https://github.com/sobolevn/awesome-cryptography

Last synced: 1 day ago
JSON representation

  • Theory

    • Other lists

    • Courses

      • Cryptography I - The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems.
      • A Self-Study Course In Block-Cipher Cryptanalysis - This paper attempts to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn cryptanalytic techniques and ways to break algorithms, by Bruce Schneier.
      • Applied Cryptography - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
      • Crypto Strikes Back! - This talk will cover crypto vulnerabilities in widely-deployed systems and how the smallest oversight resulted in catastrophe.
      • Cryptography - A practical oriented course in Cryptography by University of Maryland College Park.
      • Cryptography - Stanford University - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
      • Journey into cryptography - The course of cryptography by Khan Academy.
      • Theory and Practice of Cryptography - Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.
      • Practical Aspects of Modern Cryptography - Practical Aspects of Modern Cryptography, Winter 2006 University of Washington CSE.
      • Cryptography 101: Building Blocks - This introductory course (Fall 2024) by Alfred Menezes covers the fundamental cryptographic primitives: symmetric-key encryption, hash functions, MACs, authenticated encryption, public-key encryption, signatures, key agreement, RSA, elliptic curve cryptography.
    • Algorithms

      • MD5 - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
      • 3DES - Symmetric-key block cipher (or Triple Data Encryption Algorithm (TDEA or Triple DEA), which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
      • AES - Symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption (also known as Rijndael).
      • Blowfish - Symmetric-key block cipher, designed in 1993 by Bruce Schneier. Notable features of the design include key-dependent S-boxes and a highly complex key schedule.
      • DH - A method of exchanging cryptographic keys securely over a public channel. Unlike RSA, the Diffie-Hellman Key Exchange is not encryption, and is only a way for two parties to agree on a shared secret value. Since the keys generated are completely pseudo-random, DH key exchanges can provide forward secrecy (https://en.wikipedia.org/wiki/Forward_secrecy).
      • ECC - Public-key cryptosystems based on the algebraic structure of elliptic curves over finite fields.
      • RSA - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.
      • SHA1 - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
      • SHA2 - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
      • SHA3 - Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic algorithms designed to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.
    • Books

    • Articles

  • Frameworks and Libs

    • Swift

      • IDZSwiftCommonCrypto - Wrapper for Apple's [CommonCrypto](https://opensource.apple.com/source/CommonCrypto/) library written in Swift.
      • SweetHMAC - Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.
      • Swift-Sodium - Swift interface to the Sodium library for common crypto operations for iOS and macOS.
      • CryptoSwift - Crypto related functions and helpers for Swift implemented in Swift programming language.
      • SwiftThemis - Swift wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
      • OpenSSL - Swift OpenSSL for macOS and Linux.
      • SwiftSSL - Elegant crypto toolkit in Swift.
    • C

      • themis - High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption). Ported on many languages and platforms, suitable for client-server infastructures.
      • NaCl - High-speed library for network communication, encryption, decryption, signatures, etc.
      • OpenSSL - TLS/SSL and crypto library.
      • libsodium - Modern and easy-to-use crypto library.
      • libtomcrypt - Fairly comprehensive, modular and portable cryptographic toolkit.
      • crypto-algorithms - Basic implementations of standard cryptography algorithms, like AES and SHA-1.
      • xxHash - Extremely fast hash algorithm.
      • wolfSSL - Small, fast, portable implementation of TLS/SSL for embedded devices to the cloud.
      • tiny-AES128-C - Small portable AES128 in C.
      • libkcapi - Linux Kernel Crypto API User Space Interface Library.
      • libVES.c - End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.
      • milagro-crypto-c - Small, self-contained and fast open source crypto library. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3 and Pairing-Based Cryptography.
      • nettle - is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space.
      • RHash - Great utility for computing hash sums.
      • XKCP - source implementations of the cryptographic schemes defined by the Keccak team.
      • libgcrypt - Cryptographic library developed as a separated module of GnuPG.
      • PolarSSL - PolarSSL makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint.
    • Objective-C

      • RNCryptor - CCCryptor (AES encryption) wrappers for iOS and Mac.
      • CocoaSecurity - AES, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, Base64, Hex.
      • ObjectivePGP - ObjectivePGP is an implementation of OpenPGP protocol for iOS and macOS. OpenPGP is the most widely used email encryption standard.
      • ObjC Themis - ObjC wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
    • Haskell

    • Python

      • cryptography - Python library which exposes cryptographic recipes and primitives.
      • cryptopy - Pure python implementation of cryptographic algorithms and applications.
      • pynacl - Python binding to the Networking and Cryptography (NaCl) library.
      • hashids - Implementation of [hashids](http://hashids.org) in Python.
      • bcrypt - Modern password hashing for your software and your servers.
      • pycryptodome - Self-contained Python package of low-level cryptographic primitives.
      • django-cryptography - Easily encrypt data in Django.
      • Privy - An easy, fast lib to correctly password-protect your data.
      • ecdsa - An easy-to-use implementation of ECC with support for ECDSA and ECDH.
      • charm - Framework for rapidly prototyping cryptosystems.
      • Crypto-Vinaigrette - Quantum resistant asymmetric key generation tool for digital signatures.
      • PyElliptic - Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish.
      • pythemis - Python wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
      • paramiko - Python implementation of the SSHv2 protocol, providing both client and server functionality.
    • C++

      • Botan - Cryptography library written in `C++20`.
      • Nettle - Low-level cryptographic library.
      • cryptopp - Crypto++ Library is a free C++ class library of cryptographic schemes.
      • HElib - Software library that implements homomorphic encryption (HE).
      • Nettle - Low-level cryptographic library.
      • =nil; Crypto3 - Modern Cryptography Suite in C++17 (complete applied cryptography suite starting with block ciphers and ending with threshold cryptography, zk proof systems, etc).
      • s2n - Implementation of the TLS/SSL protocols.
    • Java

      • Bouncy Castle - All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
      • Flexiprovider - Powerful toolkit for the Java Cryptography Architecture.
      • jbcrypt - jBCrypt is an implementation the OpenBSD Blowfish password hashing
      • Keycloak - Open Source Identity and Access Management For Modern Applications and Services.
      • pac4j - Security engine.
      • GDH - Generalized Diffie-Hellman key exchange Java library for multiple parties built on top of the Vert.x framework.
      • securitybuilder - Fluent Builder API for JCA/JSSE objects.
      • Password4j - A Java user-friendly cryptographic library for hashing and checking passwords with different Key derivation functions (KDFs) and Cryptographic hash functions (CHFs).
      • scrypt - Pure Java implementation of the scrypt key derivation function and a JNI interface to the C implementations, including the SSE2 optimized version.
      • Bouncy Castle - All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
      • Google Tink - A small crypto library that provides a safe, simple, agile and fast way to accomplish some common crypto tasks.
      • jbcrypt - jBCrypt is an implementation the OpenBSD Blowfish password hashing
      • Project Kalium - Java binding to the Networking and Cryptography (NaCl) library with the awesomeness of libsodium.
      • Java Themis - Java/Android wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
    • PHP

      • halite - Simple library for encryption using `libsodium`.
      • PHP Encryption - Library for encrypting data with a key or password in PHP.
      • TCrypto - TCrypto is a simple and flexible PHP 5.3+ in-memory key-value storage library.
      • libsodium-laravel - Laravel Package Abstraction using `libsodium`.
      • PHP Themis - PHP wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
    • Delphi

      • LockBox - LockBox 3 is a Delphi library for cryptography.
      • SynCrypto - Fast cryptographic routines (hashing and cypher), implementing AES, XOR, RC4, ADLER32, MD5, SHA1, SHA256 algorithms, optimized for speed.
    • C-sharp

      • Bouncy Castle - All-purpose cryptographic library.
      • StreamCryptor - Stream encryption & decryption with libsodium and protobuf.
      • SecurityDriven.Inferno - .NET crypto done right.
      • PCLCrypto - Provides cryptographic APIs over algorithms implemented by the platform, including exposing them to portable libraries.
      • Bouncy Castle - All-purpose cryptographic library.
      • libsodium-net - Secure cryptographic library, port of libsodium for .NET.
    • Clojure

      • buddy-core - Cryptographic Api.
      • secrets.clj - A Clojure library designed to generate cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and related secrets.
      • pandect - Fast and easy-to-use Message Digest, Checksum and HMAC library for Clojure.
    • Common Lisp

      • ironclad - Collection of common crypto shortcuts.
      • trivial-ssh - SSH client library for Common Lisp (Built on libssh2).
      • crypto-shortcuts - Collection of common cryptography functions.
      • ironclad - Collection of common crypto shortcuts.
    • JavaScript

      • bcrypt-Node.js - Native implementation of bcrypt for Node.js.
      • closure-library - Google's common JavaScript library.
      • sjcl - Stanford JavaScript Crypto Library.
      • TweetNaCl.js - A port of TweetNaCl / NaCl for JavaScript for modern browsers and Node.js.
      • forge - Native implementation of TLS in JavaScript and tools to write crypto-based and network-heavy webapps.
      • crypto-js - JavaScript library of crypto standards.
      • OpenPGP.js - OpenPGP implementation for JavaScript.
      • jsencrypt - JavaScript library to perform OpenSSL RSA Encryption, Decryption, and Key Generation.
      • jsrsasign - The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation.
      • rusha - High-performance pure-javascript SHA1 implementation suitable for large binary data, reaching up to half the native speed.
      • PolyCrypt - Pure JS implementation of the WebCrypto API.
      • noble-post-quantum - KEM, ML-DSA, SLH-DSA (CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+) and hybrids
      • noble-hashes
      • javascript-crypto-library - JavaScript Crypto Library provides web developers with an extensive and efficient set of cryptographic functions.
      • noble-curves - to-curve, poseidon hash, schnorr, secp256k1, ed25519, ed448, p521, bn254, bls12-381 and others. Also 4kb [noble-secp256k1](https://github.com/paulmillr/noble-secp256k1), [noble-ed25519](https://github.com/paulmillr/noble-ed25519)
      • libsodium.js - libsodium compiled to pure JavaScript, with convenient wrappers.
      • js-nacl - Pure-JavaScript High-level API to Emscripten-compiled libsodium routines.
      • cryptojs - Provide standard and secure cryptographic algorithms for Node.js.
      • cryptico - Easy-to-use encryption system utilizing RSA and AES for JavaScript.
      • milagro-crypto-js - MCJS is a standards compliant JavaScript cryptographic library with no external dependencies except for the random seed source. Compatible for Node.js and browser. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3, Pairing-Based Cryptography and New Hope.
      • JShashes - Fast and dependency-free cryptographic hashing library for Node.js and browsers (supports MD5, SHA1, SHA256, SHA512, RIPEMD, HMAC).
      • noble-ciphers - SIV, Salsa20, ChaCha, Poly1305 and FF1
      • micro-rsa-dsa-dh - Minimal implementation of older cryptography algorithms: RSA, DSA, DH, ElGamal.
      • libVES.js - End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.
      • asmCrypto - JavaScript implementation of popular cryptographic utilities with performance in mind.
      • cifre - Fast crypto toolkit for modern client-side JavaScript.
      • URSA - RSA public/private key OpenSSL bindings for Node.
      • jsThemis - JavaScript wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
      • node.bcrypt.js - bcrypt for Node.js.
    • Scheme

      • crypto-tools - Useful cryptographic primitives for Chicken Scheme.
      • guile-gnutls - GnuTLS bindings for GNU Guile.
      • guile-ssh - libssh bindings for GNU Guile.
      • chicken-sodium - Bindings to libsodium crypto library for Chicken Scheme.
      • industria - Motley assortment of cryptographic primitives, OpenSSH, DNS.
    • Rust

      • ring - Safe, fast, small crypto using Rust & BoringSSL's cryptography primitives.
      • webpki - Web PKI TLS X.509 certificate validation in Rust.
      • orion - is a cryptography library written in pure Rust. It aims to provide easy and usable crypto while trying to minimize the use of unsafe code.
      • rust-crypto - Mostly pure-Rust implementation of various cryptographic algorithms.
      • suruga - TLS 1.2 implementation in Rust.
      • octavo - Highly modular & configurable hash & crypto library.
      • hashes - Collection of cryptographic hash functions written in pure Rust.
      • rust-openssl - OpenSSL bindings for Rust.
      • BLAKE3 - is official Rust and C implementations of the BLAKE3 cryptographic hash function.
      • elliptic-curves - Collection of pure Rust elliptic curve implementations: NIST P-224, P-256, P-384, P-521, secp256k1, SM2.
      • rage - is a simple, modern, and secure file encryption tool, using the age format.
      • AEADs - Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers.
      • signatures - Cryptographic signature algorithms: DSA, ECDSA, Ed25519.
      • password-hashes - Collection of password hashing algorithms, otherwise known as password-based key derivation functions, written in pure Rust.
      • ronkathon - Educational, mathematically transparent, well documentated cryptography in rust.
      • mundane - is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant.
      • dryoc - A pure-Rust, general purpose crypto library that implements libsodium primitives.
      • formats - Cryptography-related format encoders/decoders: DER, PEM, PKCS, PKIX.
      • botan-rs - Botan bindings for Rust.
      • proteus - Axolotl protocol implementation, without header keys, in Rust.
      • rustls - Rustls is a new, modern TLS library written in Rust.
      • cryptoballot - Cryptographically secure online voting.
      • recrypt - A pure-Rust library that implements cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
      • snow - Pure Rust implementation of Trevor Perrin’s [Noise Protocol](https://noiseprotocol.org/noise.html).
      • dalek cryptography - Fast yet safe mid-level API for ECC, Bulletproofs, and more.
      • ockam - is a Rust library for end-to-end encryption and mutual authentication.
      • sodiumoxide - Sodium Oxide: Fast cryptographic library for Rust (bindings to libsodium).
    • Elixir

      • cipher - Elixir crypto library to encrypt/decrypt arbitrary binaries.
      • cloak - Cloak makes it easy to use encryption with Ecto.
      • elixir_tea - TEA implementation in Elixir.
      • ex_crypto - Elixir wrapper for Erlang `:crypto` and `:public_key` modules. Provides sensible defaults for many crypto functions to make them easier to use.
      • exgpg - Use gpg from Elixir.
      • pot - Erlang library for generating one time passwords compatible with Google Authenticator.
      • elixir-rsa - `:public_key` cryptography wrapper for Elixir.
      • comeonin - Password authorization (bcrypt) library for Elixir.
      • siphash-elixir - Elixir implementation of the SipHash hash family.
    • Go

      • kyber - Advanced crypto library for the Go language.
      • gocrypto - Example source code for the Practical Crypto with Go book.
      • dkeyczar - Port of Google's Keyczar cryptography library to Go.
      • goThemis - Go wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
    • R

      • rscrypt - Package for a collection of scrypt cryptographic functions.
    • OCaml

      • ocaml-tls - TLS in pure OCaml.
      • Digestif - is a toolbox that implements various cryptographic primitives in C and OCaml.
    • Scala

      • scrypto - Cryptographic primitives for Scala.
      • tsec - A type-safe, functional, general purpose security and cryptography library.
      • recrypt - Transform encryption library for Scala.
    • Lua

      • lua-lockbox - Collection of cryptographic primitives written in pure Lua.
      • LuaCrypto - Lua bindings to OpenSSL.
    • Julia

      • Crypto.jl - Library that wraps OpenSSL, but also has pure Julia implementations for reference.
      • MbedTLS.jl - Wrapper around the mbed TLS and cryptography C libary.
      • Nettle.jl - Julia wrapper around nettle cryptographic hashing/
      • SHA.jl - Performant, 100% native-julia SHA1, SHA2-{224,256,384,512} implementation.
    • Ruby

      • bcrypt-ruby - Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords.
      • Ruby Themis - Ruby wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
      • RbNaCl - Ruby binding to the Networking and Cryptography (NaCl) library.
  • Resources

    • Web-tools

      • keybase.io - Keybase maps your identity to your public keys, and vice versa.
      • Cryptolab - is a set of cryptography related tools.
      • factordb.com - Factordb.com is tool used to store known factorizations of any number.
      • CyberChef - a web app for encryption, encoding, compression, and data analysis.
      • Cryptolab - is a set of cryptography related tools.
      • Boxentriq - Easy to use tools for analysis and code-breaking of the most frequent ciphers, including Vigenère, Beaufort, Keyed Caesar, Transposition Ciphers, etc.
    • Web-sites

      • WebCryptoAPI - This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption.
      • Applied Crypto Hardening - A lot ready to use best practice examples for securing web servers and more.
      • Cryptohack - A platform with lots of interactive cryptography challenges, similar to Cryptopals.
      • Eliptic Curve Calculator - simple form that allows to calculate elliptic curve public keys and signatures. Features include ability to create custom curves and different signature types
      • IACR - The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
      • Subreddit of Cryptography - This subreddit is intended for links and discussions surrounding the theory and practice of strong cryptography.
      • TikZ for Cryptographers - A collection of block diagrams of common cryptographic functions drawn in TikZ to be used in research papers and presentations written in LaTeX.
      • Cryptocurrencies Dashboard - A dashboard of most active cryptocurrencies discussed on Reddit.
      • Learn Cryptography - Dedicated to helping people understand how and why the cryptographic systems they use everyday without realizing work to secure and protect their privacy.
    • Blogs

      • Schneier on security - One of the oldest and most famous security blogs. Bruce covers topics from block cipher cryptanalysis to airport security.
      • Charles Engelke's Blog - WebCrypto Blog Posts.
      • Root Labs rdist - Nate Lawson and his co-authors write on a variety of topics including hardware implementation, cryptographic timing attacks, DRM, and the Commodore 64.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
      • Bristol Cryptography Blog - Official blog for the University of Bristol cryptography research group. It's a group blog, primarily targeted towards cryptographers and crypto students.
      • Salty Hash - Covers topics on encryption, data control, privacy, and security.
    • Mailing lists

      • Modern Crypto - Forums for discussing modern cryptographic practice.
      • randombit.net - List for general discussion of cryptography, particularly the technical aspects.
  • Tools

    • Standalone

      • gpg - Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features for easy integration with other applications.
      • Databunker - API based personal data or PII storage service built to comply with GDPR and CCPA.
      • ves - End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.
      • blackbox - safely store secrets in Git/Mercurial/Subversion.
      • certbot - Previously the Let's Encrypt Client, is EFF's tool to obtain certs from Let's Encrypt, and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
      • cryptomator - Multi-platform transparent client-side encryption of your files in the cloud.
      • sops - sops is an editor of encrypted files that supports YAML, JSON and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.
      • Nipe - Nipe is a script to make Tor Network your default gateway.
      • Bcrypt - Cross-platform file encryption utility.
      • ironssh - End-to-end encrypt transferred files using sftp/scp and selectively share with others. Automatic key management works with any SSH server. Encrypted files are gpg compatible.
      • Coherence - Cryptographic server for modern web apps.
    • Playgrounds

      • Cryptography Playground - A simple web tool to play and learn basic concepts of cryptography like, hashing, symmetric, asymmetric, zkp etc.
    • Plugins

      • git-crypt - Transparent file encryption in git.