Cryptography

270 resources4 categoriesView Original

Frameworks and Libs(185 items)

=

=nil; Crypto3

Modern Cryptography Suite in C++17 (complete applied cryptography suite starting with block ciphers and ending with threshold cryptography, zk proof systems, etc).

Frameworks and Libs
A

AEADs

Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers.

Frameworks and Libs
A

Apache Shiro

Performs authentication, authorization, cryptography and session management.

Frameworks and Libs
A

asmCrypto

JavaScript implementation of popular cryptographic utilities with performance in mind.

Frameworks and Libs
B

bcrypt

Modern password hashing for your software and your servers.

Frameworks and Libs
B

bcrypt-Node.js

Native implementation of bcrypt for Node.js.

Frameworks and Libs
B

bcrypt-ruby

Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords.

Frameworks and Libs
B

BLAKE3

is official Rust and C implementations of the BLAKE3 cryptographic hash function.

Frameworks and Libs
B

Botan

Cryptography library written in `C++20`.

Frameworks and Libs
B

botan-rs

Botan bindings for Rust.

Frameworks and Libs
B

Bouncy Castle

All-purpose cryptographic library.

Frameworks and Libs
B

Bouncy Castle

All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.

Frameworks and Libs
B

buddy-core

Cryptographic Api.

Frameworks and Libs
C

charm

Framework for rapidly prototyping cryptosystems.

Frameworks and Libs
C

chicken-sodium

Bindings to libsodium crypto library for Chicken Scheme.

Frameworks and Libs
C

cifre

Fast crypto toolkit for modern client-side JavaScript.

Frameworks and Libs
C

cipher

Elixir crypto library to encrypt/decrypt arbitrary binaries.

Frameworks and Libs
C

clj-crypto

Wrapper for Bouncy Castle.

Frameworks and Libs
C

cloak

Cloak makes it easy to use encryption with Ecto.

Frameworks and Libs
C

closure-library

Google's common JavaScript library.

Frameworks and Libs
C

CocoaSecurity

AES, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, Base64, Hex.

Frameworks and Libs
C

comeonin

Password authorization (bcrypt) library for Elixir.

Frameworks and Libs
C

cryptico

Easy-to-use encryption system utilizing RSA and AES for JavaScript.

Frameworks and Libs
C

crypto

Functions for computation of message digests, and functions for encryption and decryption.

Frameworks and Libs
C

crypto

Official Website Resources.

Frameworks and Libs
C

crypto-algorithms

Basic implementations of standard cryptography algorithms, like AES and SHA-1.

Frameworks and Libs
C

crypto-js

JavaScript library of crypto standards.

Frameworks and Libs
C

crypto-shortcuts

Collection of common cryptography functions.

Frameworks and Libs
C

crypto-tools

Useful cryptographic primitives for Chicken Scheme.

Frameworks and Libs
C

Crypto-Vinaigrette

Quantum resistant asymmetric key generation tool for digital signatures.

Frameworks and Libs
C

Crypto.jl

Library that wraps OpenSSL, but also has pure Julia implementations for reference.

Frameworks and Libs
C

cryptoballot

Cryptographically secure online voting.

Frameworks and Libs
C

Cryptography

Collaborative Hackage list.

Frameworks and Libs
C

cryptography

Python library which exposes cryptographic recipes and primitives.

Frameworks and Libs
C

Cryptography & Hashing

Official Website of Haskell.

Frameworks and Libs
C

cryptojs

Provide standard and secure cryptographic algorithms for Node.js.

Frameworks and Libs
C

cryptol

The Language of Cryptography.

Frameworks and Libs
C

Cryptonite

Haskell repository of cryptographic primitives.

Frameworks and Libs
C

cryptopp

Crypto++ Library is a free C++ class library of cryptographic schemes.

Frameworks and Libs
C

cryptopy

Pure python implementation of cryptographic algorithms and applications.

Frameworks and Libs
C

CryptoSwift

Crypto related functions and helpers for Swift implemented in Swift programming language.

Frameworks and Libs
D

dalek cryptography

Fast yet safe mid-level API for ECC, Bulletproofs, and more.

Frameworks and Libs
D

DelphiEncryptionCompendium

Cryptographic library for Delphi.

Frameworks and Libs
D

Digestif

is a toolbox that implements various cryptographic primitives in C and OCaml.

Frameworks and Libs
D

django-cryptography

Easily encrypt data in Django.

Frameworks and Libs
D

dkeyczar

Port of Google's Keyczar cryptography library to Go.

Frameworks and Libs
D

dryoc

A pure-Rust, general purpose crypto library that implements libsodium primitives.

Frameworks and Libs
E

ecdsa

An easy-to-use implementation of ECC with support for ECDSA and ECDH.

Frameworks and Libs
E

elixir-rsa

`:public_key` cryptography wrapper for Elixir.

Frameworks and Libs
E

elixir_tea

TEA implementation in Elixir.

Frameworks and Libs
E

elliptic-curves

Collection of pure Rust elliptic curve implementations: NIST P-224, P-256, P-384, P-521, secp256k1, SM2.

Frameworks and Libs
E

exgpg

Use gpg from Elixir.

Frameworks and Libs
E

ex_crypto

Elixir wrapper for Erlang `:crypto` and `:public_key` modules. Provides sensible defaults for many crypto functions to make them easier to use.

Frameworks and Libs
F

Flexiprovider

Powerful toolkit for the Java Cryptography Architecture.

Frameworks and Libs
F

forge

Native implementation of TLS in JavaScript and tools to write crypto-based and network-heavy webapps.

Frameworks and Libs
F

formats

Cryptography-related format encoders/decoders: DER, PEM, PKCS, PKIX.

Frameworks and Libs
G

GDH

Generalized Diffie-Hellman key exchange Java library for multiple parties built on top of the Vert.x framework.

Frameworks and Libs
G

gocrypto

Example source code for the Practical Crypto with Go book.

Frameworks and Libs
G

Google Tink

A small crypto library that provides a safe, simple, agile and fast way to accomplish some common crypto tasks.

Frameworks and Libs
G

goThemis

Go wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
G

guile-gnutls

GnuTLS bindings for GNU Guile.

Frameworks and Libs
G

guile-ssh

libssh bindings for GNU Guile.

Frameworks and Libs
H

halite

Simple library for encryption using `libsodium`.

Frameworks and Libs
H

hashes

Collection of cryptographic hash functions written in pure Rust.

Frameworks and Libs
H

hashids

Implementation of hashids in Python.

Frameworks and Libs
H

haxe-crypto

Haxe Cryptography Library.

Frameworks and Libs
H

HElib

Software library that implements homomorphic encryption (HE).

Frameworks and Libs
H

HsOpenSSL

OpenSSL binding for Haskel.

Frameworks and Libs
I

IDZSwiftCommonCrypto

Wrapper for Apple's CommonCrypto library written in Swift.

Frameworks and Libs
I

industria

Motley assortment of cryptographic primitives, OpenSSH, DNS.

Frameworks and Libs
I

ironclad

Collection of common crypto shortcuts.

Frameworks and Libs
I

IronNode

Transform encryption library, a variant of proxy re-encryption, for encrypting to users or groups, and easily adding strong data controls to Node.js apps.

Frameworks and Libs
I

IronWeb

Transform encryption library, a variant of proxy re-encryption, for easily managing end-to-end encryption securely in the browser.

Frameworks and Libs
J

Java Themis

Java/Android wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
J

javascript-crypto-library

JavaScript Crypto Library provides web developers with an extensive and efficient set of cryptographic functions.

Frameworks and Libs
J

jbcrypt

jBCrypt is an implementation the OpenBSD Blowfish password hashing

Frameworks and Libs
J

js-nacl

Pure-JavaScript High-level API to Emscripten-compiled libsodium routines.

Frameworks and Libs
J

jsencrypt

JavaScript library to perform OpenSSL RSA Encryption, Decryption, and Key Generation.

Frameworks and Libs
J

JShashes

Fast and dependency-free cryptographic hashing library for Node.js and browsers (supports MD5, SHA1, SHA256, SHA512, RIPEMD, HMAC).

Frameworks and Libs
J

jsrsasign

The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation.

Frameworks and Libs
J

jsThemis

JavaScript wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
K

Keycloak

Open Source Identity and Access Management For Modern Applications and Services.

Frameworks and Libs
K

kyber

Advanced crypto library for the Go language.

Frameworks and Libs
L

libgcrypt

Cryptographic library developed as a separated module of GnuPG.

Frameworks and Libs
L

libkcapi

Linux Kernel Crypto API User Space Interface Library.

Frameworks and Libs
L

libsodium

Modern and easy-to-use crypto library.

Frameworks and Libs
L

libsodium-laravel

Laravel Package Abstraction using `libsodium`.

Frameworks and Libs
L

libsodium-net

Secure cryptographic library, port of libsodium for .NET.

Frameworks and Libs
L

libsodium.js

libsodium compiled to pure JavaScript, with convenient wrappers.

Frameworks and Libs
L

libtomcrypt

Fairly comprehensive, modular and portable cryptographic toolkit.

Frameworks and Libs
L

libVES.c

End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.

Frameworks and Libs
L

libVES.js

End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.

Frameworks and Libs
L

LockBox

LockBox 3 is a Delphi library for cryptography.

Frameworks and Libs
L

lua-lockbox

Collection of cryptographic primitives written in pure Lua.

Frameworks and Libs
L

LuaCrypto

Lua bindings to OpenSSL.

Frameworks and Libs
M

MbedTLS.jl

Wrapper around the mbed TLS and cryptography C libary.

Frameworks and Libs
M

micro-rsa-dsa-dh

Minimal implementation of older cryptography algorithms: RSA, DSA, DH, ElGamal.

Frameworks and Libs
M

Microsoft .NET Framework Cryptography Model

The .NET Framework implementations of many standard cryptographic algorithms.

Frameworks and Libs
M

milagro-crypto-c

Small, self-contained and fast open source crypto library. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3 and Pairing-Based Cryptography.

Frameworks and Libs
M

milagro-crypto-js

MCJS is a standards compliant JavaScript cryptographic library with no external dependencies except for the random seed source. Compatible for Node.js and browser. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3, Pairing-Based Cryptography and New Hope.

Frameworks and Libs
M

monocypher

small, portable, easy to use crypto library inspired by libsodium and TweetNaCl.

Frameworks and Libs
M

mundane

is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant.

Frameworks and Libs
N

NaCl

High-speed library for network communication, encryption, decryption, signatures, etc.

Frameworks and Libs
N

nettle

is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space.

Frameworks and Libs
N

Nettle

Low-level cryptographic library.

Frameworks and Libs
N

Nettle.jl

Julia wrapper around nettle cryptographic hashing/

Frameworks and Libs
N

noble-ciphers

— cryptographic ciphers, including AES-SIV, Salsa20, ChaCha, Poly1305 and FF1

Frameworks and Libs
N

noble-curves

— elliptic curve cryptography, including Weierstrass, Edwards, Montgomery curves, pairings, hash-to-curve, poseidon hash, schnorr, secp256k1, ed25519, ed448, p521, bn254, bls12-381 and others. Also 4kb noble-secp256k1, noble-ed25519

Frameworks and Libs
N

noble-hashes

— SHA2, SHA3, RIPEMD, BLAKE2/3, HMAC, HKDF, PBKDF2, Scrypt & Argon2id

Frameworks and Libs
N

noble-post-quantum

— ML-KEM, ML-DSA, SLH-DSA (CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+) and hybrids

Frameworks and Libs
N

node.bcrypt.js

bcrypt for Node.js.

Frameworks and Libs
O

ObjC Themis

ObjC wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
O

ObjectivePGP

ObjectivePGP is an implementation of OpenPGP protocol for iOS and macOS. OpenPGP is the most widely used email encryption standard.

Frameworks and Libs
O

ocaml-tls

TLS in pure OCaml.

Frameworks and Libs
O

ockam

is a Rust library for end-to-end encryption and mutual authentication.

Frameworks and Libs
O

octavo

Highly modular & configurable hash & crypto library.

Frameworks and Libs
O

OpenPGP.js

OpenPGP implementation for JavaScript.

Frameworks and Libs
O

OpenSSL

TLS/SSL and crypto library.

Frameworks and Libs
O

OpenSSL

Swift OpenSSL for macOS and Linux.

Frameworks and Libs
O

orion

is a cryptography library written in pure Rust. It aims to provide easy and usable crypto while trying to minimize the use of unsafe code.

Frameworks and Libs
P

pac4j

Security engine.

Frameworks and Libs
P

pandect

Fast and easy-to-use Message Digest, Checksum and HMAC library for Clojure.

Frameworks and Libs
P

paramiko

Python implementation of the SSHv2 protocol, providing both client and server functionality.

Frameworks and Libs
P

password-hashes

Collection of password hashing algorithms, otherwise known as password-based key derivation functions, written in pure Rust.

Frameworks and Libs
P

Password4j

A Java user-friendly cryptographic library for hashing and checking passwords with different Key derivation functions (KDFs) and Cryptographic hash functions (CHFs).

Frameworks and Libs
P

PCLCrypto

Provides cryptographic APIs over algorithms implemented by the platform, including exposing them to portable libraries.

Frameworks and Libs
P

PHP Encryption

Library for encrypting data with a key or password in PHP.

Frameworks and Libs
P

PHP Themis

PHP wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
P

PolarSSL

PolarSSL makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint.

Frameworks and Libs
P

PolyCrypt

Pure JS implementation of the WebCrypto API.

Frameworks and Libs
P

pot

Erlang library for generating one time passwords compatible with Google Authenticator.

Frameworks and Libs
P

Privy

An easy, fast lib to correctly password-protect your data.

Frameworks and Libs
P

Project Kalium

Java binding to the Networking and Cryptography (NaCl) library with the awesomeness of libsodium.

Frameworks and Libs
P

proteus

Axolotl protocol implementation, without header keys, in Rust.

Frameworks and Libs
P

public_key

Provides functions to handle public-key infrastructure.

Frameworks and Libs
P

pycryptodome

Self-contained Python package of low-level cryptographic primitives.

Frameworks and Libs
P

PyElliptic

Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish.

Frameworks and Libs
P

pynacl

Python binding to the Networking and Cryptography (NaCl) library.

Frameworks and Libs
P

pythemis

Python wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
R

rage

is a simple, modern, and secure file encryption tool, using the age format.

Frameworks and Libs
R

RbNaCl

Ruby binding to the Networking and Cryptography (NaCl) library.

Frameworks and Libs
R

recrypt

A pure-Rust library that implements cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.

Frameworks and Libs
R

recrypt

Transform encryption library for Scala.

Frameworks and Libs
R

RHash

Great utility for computing hash sums.

Frameworks and Libs
R

ring

Safe, fast, small crypto using Rust & BoringSSL's cryptography primitives.

Frameworks and Libs
R

RNCryptor

CCCryptor (AES encryption) wrappers for iOS and Mac.

Frameworks and Libs
R

ronkathon

Educational, mathematically transparent, well documentated cryptography in rust.

Frameworks and Libs
R

rscrypt

Package for a collection of scrypt cryptographic functions.

Frameworks and Libs
R

Ruby Themis

Ruby wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
R

rusha

High-performance pure-javascript SHA1 implementation suitable for large binary data, reaching up to half the native speed.

Frameworks and Libs
R

rust-crypto

Mostly pure-Rust implementation of various cryptographic algorithms.

Frameworks and Libs
R

rust-openssl

OpenSSL bindings for Rust.

Frameworks and Libs
R

rustls

Rustls is a new, modern TLS library written in Rust.

Frameworks and Libs
S

s2n

Implementation of the TLS/SSL protocols.

Frameworks and Libs
S

scrypt

Haskell bindings to Colin Percival's scrypt implementation.

Frameworks and Libs
S

scrypt

Pure Java implementation of the scrypt key derivation function and a JNI interface to the C implementations, including the SSE2 optimized version.

Frameworks and Libs
S

scrypto

Cryptographic primitives for Scala.

Frameworks and Libs
S

secrets.clj

A Clojure library designed to generate cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and related secrets.

Frameworks and Libs
S

securitybuilder

Fluent Builder API for JCA/JSSE objects.

Frameworks and Libs
S

SecurityDriven.Inferno

.NET crypto done right.

Frameworks and Libs
S

SHA.jl

Performant, 100% native-julia SHA1, SHA2-{224,256,384,512} implementation.

Frameworks and Libs
S

signatures

Cryptographic signature algorithms: DSA, ECDSA, Ed25519.

Frameworks and Libs
S

siphash-elixir

Elixir implementation of the SipHash hash family.

Frameworks and Libs
S

sjcl

Stanford JavaScript Crypto Library.

Frameworks and Libs
S

snow

Pure Rust implementation of Trevor Perrin’s Noise Protocol.

Frameworks and Libs
S

sodiumoxide

Sodium Oxide: Fast cryptographic library for Rust (bindings to libsodium).

Frameworks and Libs
S

StreamCryptor

Stream encryption & decryption with libsodium and protobuf.

Frameworks and Libs
S

suruga

TLS 1.2 implementation in Rust.

Frameworks and Libs
S

SweetHMAC

Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.

Frameworks and Libs
S

Swift-Sodium

Swift interface to the Sodium library for common crypto operations for iOS and macOS.

Frameworks and Libs
S

SwiftSSL

Elegant crypto toolkit in Swift.

Frameworks and Libs
S

SwiftThemis

Swift wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Frameworks and Libs
S

SynCrypto

Fast cryptographic routines (hashing and cypher), implementing AES, XOR, RC4, ADLER32, MD5, SHA1, SHA256 algorithms, optimized for speed.

Frameworks and Libs
T

TCrypto

TCrypto is a simple and flexible PHP 5.3+ in-memory key-value storage library.

Frameworks and Libs
T

TForge

TForge is open-source crypto library written in Delphi, compatible with FPC.

Frameworks and Libs
T

themis

High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption). Ported on many languages and platforms, suitable for client-server infastructures.

Frameworks and Libs
T

tiny-AES128-C

Small portable AES128 in C.

Frameworks and Libs
T

trivial-ssh

SSH client library for Common Lisp (Built on libssh2).

Frameworks and Libs
T

tsec

A type-safe, functional, general purpose security and cryptography library.

Frameworks and Libs
T

TweetNaCl.js

A port of TweetNaCl / NaCl for JavaScript for modern browsers and Node.js.

Frameworks and Libs
U

URSA

RSA public/private key OpenSSL bindings for Node.

Frameworks and Libs
W

webpki

Web PKI TLS X.509 certificate validation in Rust.

Frameworks and Libs
W

wolfSSL

Small, fast, portable implementation of TLS/SSL for embedded devices to the cloud.

Frameworks and Libs
X

XKCP

— is a repository that gathers different free and open-source implementations of the cryptographic schemes defined by the Keccak team.

Frameworks and Libs
X

xxHash

Extremely fast hash algorithm.

Frameworks and Libs

Resources(27 items)

A

A Few Thoughts on Cryptographic Engineering

Some random thoughts about crypto.

Resources
A

Applied Crypto Hardening

A lot ready to use best practice examples for securing web servers and more.

Resources
B

Boxentriq

Easy to use tools for analysis and code-breaking of the most frequent ciphers, including Vigenère, Beaufort, Keyed Caesar, Transposition Ciphers, etc.

Resources
B

Bristol Cryptography Blog

Official blog for the University of Bristol cryptography research group. It's a group blog, primarily targeted towards cryptographers and crypto students.

Resources
C

Charles Engelke's Blog

WebCrypto Blog Posts.

Resources
C

Cryptocurrencies Dashboard

A dashboard of most active cryptocurrencies discussed on Reddit.

Resources
C

Cryptography Stackexchange

Cryptography Stack Exchange is a question and answer site for software developers, mathematicians and others interested in cryptography.

Resources
C

Cryptohack

A platform with lots of interactive cryptography challenges, similar to Cryptopals.

Resources
C

Cryptolab

is a set of cryptography related tools.

Resources
C

CrypTool

Great variety of ciphers, encryption methods and analysis tools are introduced, often together with illustrated examples.

Resources
C

Cryptopals Crypto Challenges

A series of applied cryptography challenges, starting from very basic challenges, such as hex to base 64 challanges, and gradually increasing the difficulty up to abstract algebra.

Resources
C

CyberChef

a web app for encryption, encoding, compression, and data analysis.

Resources
E

Eliptic Curve Calculator

simple form that allows to calculate elliptic curve public keys and signatures. Features include ability to create custom curves and different signature types

Resources
F

factordb.com

Factordb.com is tool used to store known factorizations of any number.

Resources
G

Garykessler Crypto

An Overview of Cryptography.

Resources
I

IACR

The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Resources
K

keybase.io

Keybase maps your identity to your public keys, and vice versa.

Resources
L

Learn Cryptography

Dedicated to helping people understand how and why the cryptographic systems they use everyday without realizing work to secure and protect their privacy.

Resources
M

metzdowd.com

"Cryptography" is a low-noise moderated mailing list devoted to cryptographic technology and its political impact.

Resources
M

Modern Crypto

Forums for discussing modern cryptographic practice.

Resources
R

randombit.net

List for general discussion of cryptography, particularly the technical aspects.

Resources
R

Root Labs rdist

Nate Lawson and his co-authors write on a variety of topics including hardware implementation, cryptographic timing attacks, DRM, and the Commodore 64.

Resources
S

Salty Hash

Covers topics on encryption, data control, privacy, and security.

Resources
S

Schneier on security

One of the oldest and most famous security blogs. Bruce covers topics from block cipher cryptanalysis to airport security.

Resources
S

Subreddit of Cryptography

This subreddit is intended for links and discussions surrounding the theory and practice of strong cryptography.

Resources
T

TikZ for Cryptographers

A collection of block diagrams of common cryptographic functions drawn in TikZ to be used in research papers and presentations written in LaTeX.

Resources
W

WebCryptoAPI

This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption.

Resources

Theory(44 items)

3

3DES

Symmetric-key block cipher (or Triple Data Encryption Algorithm (TDEA or Triple DEA), which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.

Theory
A

A Graduate Course in Applied Cryptography

The book covers many constructions for different tasks in cryptography.

Theory
A

A Self-Study Course In Block-Cipher Cryptanalysis

This paper attempts to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn cryptanalytic techniques and ways to break algorithms, by Bruce Schneier.

Theory
A

AES

Symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption (also known as Rijndael).

Theory
A

An Introduction to Mathematical Cryptography

Introduction to modern cryptography.

Theory
A

Applied Cryptography

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Theory
A

Applied Cryptography: Protocols, Algorithms and...

This cryptography classic provides you with a comprehensive survey of modern cryptography.

Theory
A

Awesome crypto-papers

– A curated list of cryptography papers, articles, tutorials and howtos.

Theory
A

Awesome HE

– A curated list of homomorphic encryption libraries, software and resources.

Theory
B

Blowfish

) - Symmetric-key block cipher, designed in 1993 by Bruce Schneier. Notable features of the design include key-dependent S-boxes and a highly complex key schedule.

Theory
C

Crypto Strikes Back!

This talk will cover crypto vulnerabilities in widely-deployed systems and how the smallest oversight resulted in catastrophe.

Theory
C

Crypto101

Crypto 101 is an introductory course on cryptography.

Theory
C

Cryptography

A practical oriented course in Cryptography by University of Maryland College Park.

Theory
C

Cryptography - Stanford University

This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.

Theory
C

Cryptography 101: Building Blocks

This introductory course (Fall 2024) by Alfred Menezes covers the fundamental cryptographic primitives: symmetric-key encryption, hash functions, MACs, authenticated encryption, public-key encryption, signatures, key agreement, RSA, elliptic curve cryptography.

Theory
C

Cryptography Engineering

Learn to build cryptographic protocols that work in the real world.

Theory
C

Cryptography I

The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems.

Theory
C

Cybrary Cryptography

This online course we will cover how cryptography is the cornerstone of security, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access.

Theory
D

DH

A method of exchanging cryptographic keys securely over a public channel. Unlike RSA, the Diffie-Hellman Key Exchange is not encryption, and is only a way for two parties to agree on a shared secret value. Since the keys generated are completely pseudo-random, DH key exchanges can provide forward secrecy (https://en.wikipedia.org/wiki/Forward_secrecy).

Theory
E

ECC

Public-key cryptosystems based on the algebraic structure of elliptic curves over finite fields.

Theory
H

Handbook of Applied Cryptography

This book is intended as a reference for professional cryptographers.

Theory
H

Harvard's Cryptography Lecture notes

An introductory but fast-paced undergraduate/beginning graduate course on cryptography, Used for Harvard CS 127.

Theory
H

How to Generate Secure Random Numbers in Variou...

.

Theory
I

Introduction to Modern Cryptography

Introductory-level treatment of cryptography written from a modern, computer science perspective.

Theory
J

Journey into cryptography

The course of cryptography by Khan Academy.

Theory
M

MD5

Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.

Theory
O

OpenSSL Cookbook

The book about OpenSSL.

Theory
P

Password Insecurity

This article is written for everybody who is interested in password security.

Theory
P

Practical Aspects of Modern Cryptography

Practical Aspects of Modern Cryptography, Winter 2006 University of Washington CSE.

Theory
P

Practical Cryptography for Developers

Developer-friendly book on modern cryptography (hashes, MAC codes, symmetric and asymmetric ciphers, key exchange, elliptic curves, digital signatures) with lots of code examples.

Theory
R

Real World Cryptography

This book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.

Theory
R

RSA

) - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.

Theory
S

Secure Account Recovery Made Simple

.

Theory
S

Security Engineering

There is an extraordinary textbook written by Ross Anderson, professor of computer security at University of Cambridge.

Theory
S

Serious Cryptography

A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson.

Theory
S

SHA1

Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.

Theory
S

SHA2

Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.

Theory
S

SHA3

Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic algorithms designed to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.

Theory
T

The Code Book

This book is a digest of the history of cryptography, covering both ancient times, and newer cryptography methods. There are exercises at the end and the solution of those was rewarded with $10.000.

Theory
T

The Cryptoparty Handbook

This book provides a comprehensive guide to the various topics of the computer and internet security.

Theory
T

Theory and Practice of Cryptography

Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.

Theory
T

TLS Cipher Suites

A list of TLS cipher suites and their security ratings.

Theory
T

Transform Encryption (aka Proxy Re-Encryption)

Transform encryption uses three mathematically related keys: one to encrypt plaintext to a recipient, a second to decrypt the ciphertext, and a third to transform ciphertext encrypted to one recipient so it can be decrypted by a different recipient.

Theory
U

Understanding Cryptography

Often overlooked, this book is a boon for beginners to the field. It contains plenty of exercises at the end of each chapter, aimed at reinforcing concepts and cementing ideas.

Theory

Tools(14 items)

B

Bcrypt

Cross-platform file encryption utility.

Tools
B

blackbox

safely store secrets in Git/Mercurial/Subversion.

Tools
C

certbot

Previously the Let's Encrypt Client, is EFF's tool to obtain certs from Let's Encrypt, and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.

Tools
C

Coherence

Cryptographic server for modern web apps.

Tools
C

Cryptography Playground

A simple web tool to play and learn basic concepts of cryptography like, hashing, symmetric, asymmetric, zkp etc.

Tools
C

cryptomator

Multi-platform transparent client-side encryption of your files in the cloud.

Tools
D

Databunker

API based personal data or PII storage service built to comply with GDPR and CCPA.

Tools
G

git-crypt

Transparent file encryption in git.

Tools
G

git-secret

Bash-tool to store your private data inside a git repository.

Tools
G

gpg

Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features for easy integration with other applications.

Tools
I

ironssh

End-to-end encrypt transferred files using sftp/scp and selectively share with others. Automatic key management works with any SSH server. Encrypted files are gpg compatible.

Tools
N

Nipe

Nipe is a script to make Tor Network your default gateway.

Tools
S

sops

sops is an editor of encrypted files that supports YAML, JSON and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.

Tools
V

ves

End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.

Tools