There are 1 repository under rsa-key-encryption topic.
Open Source License Key Generation and Verification Tool written in Go
A Linux Ransomware
Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful collision occurs.
KeePass plugin that allows to use Smart Card certificates to encrypt database more securely.
Example of Generating RSA Keys
:sheep: Decentralized chat with private messages and rooms. Messages and files are encrypted using RSA
Simple RSA cryptographyc algorithm implementation
A CrossLanguage Encryption Module to encrypt data/files (Asymmetric and Symmetric encryption handled)
Node.js library for simple implementation of encryption, decryption and digital signatures
:lock: Share AES-256 encrypted vault file with your teammates using only ssh authorized_keys!
RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard (the factoring problem). RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message
A django based chat application where you can send messages encrypted using RSA algorithm.
RSA Encryption and Decryption project
Recover a Private Key from a given Public Key using the Right Triangle-based Constant time mathematical solution method.
Simplest implementation of RSA algorithm encryption and decryption. (In only 13 lines)
Simple property ecryptor/decryptor extension for Spring Framework (RSA Public and Private PEM keys and the like).
A nodeJs API template that implements authentication via JWTs
Because fuck Armoury Crate and fuck security-by-obscurity.
RSA Encryption Decryption Tool
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and Private key is kept private.
Data_Encryption_using_RSA_cryptography_in_C++
Secure MessageSystem in C# with RSA-Keys
Encryption and Decryption using the RSA Algorithm
The Crypto Service Suite is a set of products that performs common cryptographic operations securely and efficiently. 🔐
Modified package for RSA encryption/decryption to allow large message encryption/decryption, to allow encryption through private key and decryption through public key and signature through public key and private key and vice versa. i.e. Additional functionalities to the existing crypto package https://pkg.go.dev/github.com/gossl/rsam
This is a very basic ransomware created using Python
Simple implementation of RSA algorithm, asymmetric cryptography algorithm
RSA and Public Key Cryptography designed and conducted research experiments to test theories for improved performance.
Explore fundamental Git concepts through this practical example of a project, enabling effective code management and seamless collaboration
Example implementation secure jwt access token
A Rust lib to encrypt/decrypt data with RSA public/private key pair and do base85/base64 encoding/decoding.
Bullying Zoom,Signal and many others
RSA Algorithm (asymmetric key) encryption and decryption program created in python. Drake and Elley did this as a project to accompany their Discrete Mathematics 2 Course at Western Governors University
This program contains socket programming where communication between client and server is end-to-end encrypted by El-Gamal public-key encryption scheme.
RSA Factoring Challenge