GhostPoltergeist / RenWvr

Data is converted into ciphertext using an encryption technique. The data will be altered by an algorithm using the encryption key in a predictable fashion, such that even though the encrypted data may seem random, it can be decrypted and returned to plaintext using the decryption key.

Home Page:https://ghostpoltergeist.github.io/RenWvr/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Forks Stargazers Issues GPL3 License


Logo

REN(WVR) | Encryption Algorithm

Crypto algorithms, authentication, and digital signatures are all crucial activities that require cryptographic algorithms. However, in order to apply these techniques, the issue of tying cryptographic keys to machine or user identities must be resolved. In general it is mathematical process used to encrypt data is called an encryption algorithm. Information is encoded into cipher text using an algorithm and a key and it takes the usage of a "key" to restore the data to its original form.
Explore the Docs »

View Demo | · Report Bug | · Request Feature

Table of Contents
  1. About The Project
  2. Getting Started
  3. Usage
  4. Roadmap
  5. Contributing
  6. License
  7. Contact
  8. Acknowledgments

About The Project Process

Obtain the public key for the individual whose information you wish to be readable. If you obtain the key from a public key ring, get in touch with the owner to verify that the string of letters and digits on the key corresponds to their unique fingerprint. Utilize their public key to encrypt the email message. Most email applications contain a function that makes this process simple to do. The recipient will be able to decode the communication once they get it.

(back to top)

Built With

  • Java
  • PowerShell
  • Git

Docs

  • JavaScript
  • HTML5
  • CSS3
  • Bootstrap

(back to top)

Getting Started

Running this Application requires knowledge in Encryption, just simply follow the instructions inside And you are good to go.

Prerequisites

OTHER NOTES

  • JDK (8)-(17)
  • Windows OS

Installation

  1. Download Release package
  2. Install JDK Latest Version
  3. Run through windows(.exe) File and Follow the Instructions

(back to top)

Usage

Run through windows(.exe) File and Follow the Instructions

For more Information, please refer to the Documentation

(back to top)

Roadmap

  • The Program allows No limit of PlainText as long as you follow the [Major] Instructions
  • It allows you to make adjustment in Security Level
  • Fully Customize Encryption with Unlimited Integer Range of Values
    • and etc.

See the open issues for a full list of proposed features (and known issues).

(back to top)

Contributing

Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.

If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

(back to top)

License

Distributed under the MIT License. See LICENSE.txt for more information.

(back to top)

Contact

Project Link: REN-(WVR)

(back to top)

About

Data is converted into ciphertext using an encryption technique. The data will be altered by an algorithm using the encryption key in a predictable fashion, such that even though the encrypted data may seem random, it can be decrypted and returned to plaintext using the decryption key.

https://ghostpoltergeist.github.io/RenWvr/

License:MIT License


Languages

Language:Java 53.6%Language:HTML 44.5%Language:Inno Setup 1.9%