image thumbnail

updated 11 months ago

Caesar Cipher by Nikesh Bajaj

This is Program for Caesar Cipher encryption Technique. (encryption, cryptography, communications)

C=caesar_E(P,k)

P=caesar_D(C,k)

image thumbnail

updated 1 year ago

Steganography using LSB substitution by Ashish Soni

The term steganography means “cover writing” (image processing, steganography, cryptography)

Steg.m

image thumbnail

updated 1 year ago

Distributed Storage based on Secret Sharing Schemes (D4S) by Shuang Wang

Distributed Storage based on Secret Sharing Schemes (secret sharing, distributed storage, cryptography)

ImageSharing

image thumbnail

updated almost 2 years ago

Implementation of RSA Algorithm by Shaun Gomez

RSA is an algorithm for public-key cryptography. (encryption, rsa algorithm, publickey encryption)

crypt(M,N,e)

dec2bin(d)

intialize(p,q)

image thumbnail

updated 2 years ago

Data Encryption Standard (DES) by Yue Wu

The last generation of encryption standard, good for cryptography study and cipher design. (cryptography, data encryption, feistel network)

DES(input64,mode,key)

image thumbnail

updated 2 years ago

Algorithmic pseudo-random permutations for large sequences by JD

permdata = createRandomPermutation(numobjects, nrounds) create a pseudo-random permutation (permutation, permutations, cryptography)

createRandomPermutation(numobjects, nrounds)

image thumbnail

updated 2 years ago

Converting into character from decimal by Mayukh

Works as to reproduce character values from ASCII values (cryptography)

[txt_dec]=Char2Dec(plaintext)

image thumbnail

updated 2 years ago

Creating a stream of binary values by Mayukh

It is actually a long matrix having one row & several number of columns. (cryptography)

Binstrm( a )

image thumbnail

updated 2 years ago

Converting Binary strean into its decimal values by Mayukh

It converts binary stream into its decimal value taking 8 bits at a time although you can change it. (cryptography)

txt_dec=Bin2Dec(txt_bin)

image thumbnail

updated 2 years ago

append upto the multiple of 48 by Mayukh

It calculates the length of the binary array & makes it multiple of 48 by adding sting of 0 (cryptography)

apndup248( l )

image thumbnail

updated 2 years ago

One Time Pad by Mayukh

Onetimepad encryption under the category og substitution cipher (cryptography)

onetimepad.m

image thumbnail

updated 3 years ago

Visual Cryptography by Athi

Generation of two-out-of-two Visual Cryptography Scheme shares. (image processing, mathematics, image sharing)

VisCrypt(inImg)

generateShare(a,b)

Main.m

image thumbnail

updated 3 years ago

Substitution Cipher encoder and decoder by Dafydd Stephenson

A simple pair of functions to encode messages and decode them by means of frequency analysis. (substitution cipher, substitution, cryptanalysis)

attempt=subdecode(message)

cipher=subencode(message)

image thumbnail

updated 3 years ago

Transposition encryption technique by Ajmer Singh

This program helps you to encrypt any text file using transposition encryption technique (transposition cipher, cryptography, communications)

[cipher_data]=Transposition_encryption(N)

image thumbnail

updated 3 years ago

Improved Base Expansion Algorithm by Alexander Wallar

This is an improvement of my last base expansion algorithm (base, expansion, algorithm)

baseVecExpand(n,c,b)

image thumbnail

updated almost 4 years ago

voice encryption by andi yusuf

encrypt your voice using OTP algorithm (encryption, voice, otp)

AddDatabase(varargin)

GrafikDekripsi(varargin)

GrafikEnkripsi(varargin)

image thumbnail

updated almost 4 years ago

Deploying a Shared Library by Peter Webb

Example code for "Deploying Shared Libraries" posting in the "Art of MATLAB" blog. (vigenere, cryptography, cipher)

decrypt(ciphertext, key)

encrypt(plaintext, key)

vigenere

image thumbnail

updated almost 7 years ago

Modular Inverse by G. Levin

Finds the modular inverse over finite (Galois) field. (coding theory, information theory, galois)

y=mulinv(x,p)

image thumbnail

updated 9 years ago

MATLAB for Cryptography by andi yusuf

bent function for test s-box. (bent function, test, sbox)

bent(sbox,input,z,file2)

convert(file)

image thumbnail

updated 12 years ago

Basic String Cryptography by Bill Higley

A couple of simple cryptography techniques. (encode, string, cryptography)

cryptoshift(in,shift)

cryptosubcode(in)

cryptosubdecode(in,key)

Contact us