image thumbnail

updated 3 months ago

Steganography using LSB substitution by Ashish Soni

The term steganography means “cover writing” (cryptography, steganography, image processing)

Steg.m

image thumbnail

updated 6 months ago

Distributed Storage based on Secret Sharing Schemes (D4S) by Shuang Wang

Distributed Storage based on Secret Sharing Schemes (secret sharing, distributed storage, cryptography)

ImageSharing

image thumbnail

updated 9 months ago

Implementation of RSA Algorithm by Shaun Gomez

RSA is an algorithm for public-key cryptography. (rsa, cryptography, publickey encryption)

crypt(M,N,e)

dec2bin(d)

intialize(p,q)

image thumbnail

updated 9 months ago

Data Encryption Standard (DES) by Yue Wu

The last generation of encryption standard, good for cryptography study and cipher design. (cryptography, data encryption, demo)

DES(input64,mode,key)

image thumbnail

updated 1 year ago

Algorithmic pseudo-random permutations for large sequences by JD

permdata = createRandomPermutation(numobjects, nrounds) create a pseudo-random permutation (permutation, permutations, cryptography)

createRandomPermutation(numobjects, nrounds)

image thumbnail

updated 1 year ago

Converting into character from decimal by Mayukh

Works as to reproduce character values from ASCII values (cryptography)

[txt_dec]=Char2Dec(plaintext)

image thumbnail

updated 1 year ago

Creating a stream of binary values by Mayukh

It is actually a long matrix having one row & several number of columns. (cryptography)

Binstrm( a )

image thumbnail

updated 1 year ago

Converting Binary strean into its decimal values by Mayukh

It converts binary stream into its decimal value taking 8 bits at a time although you can change it. (cryptography)

txt_dec=Bin2Dec(txt_bin)

image thumbnail

updated 1 year ago

append upto the multiple of 48 by Mayukh

It calculates the length of the binary array & makes it multiple of 48 by adding sting of 0 (cryptography)

apndup248( l )

image thumbnail

updated 1 year ago

One Time Pad by Mayukh

Onetimepad encryption under the category og substitution cipher (cryptography)

onetimepad.m

image thumbnail

updated 2 years ago

Visual Cryptography by Athi

Generation of two-out-of-two Visual Cryptography Scheme shares. (cryptography, image invariant visua..., image sharing)

VisCrypt(inImg)

generateShare(a,b)

Main.m

image thumbnail

updated 2 years ago

Substitution Cipher encoder and decoder by Dafydd Stephenson

A simple pair of functions to encode messages and decode them by means of frequency analysis. (substitution cipher, substitution, cryptanalysis)

attempt=subdecode(message)

cipher=subencode(message)

image thumbnail

updated 2 years ago

Transposition encryption technique by Ajmer Singh

This program helps you to encrypt any text file using transposition encryption technique (transposition cipher, cryptography, communications)

[cipher_data]=Transposition_encryption(N)

image thumbnail

updated 2 years ago

Caesar Cipher by Nikesh Bajaj

This is Program for Caesar Cipher encryption Technique. (encryption, cryptography, communications)

C=caesar_E(P,k)

P=caesar_D(C,k)

image thumbnail

updated 2 years ago

Improved Base Expansion Algorithm by Alexander Wallar

This is an improvement of my last base expansion algorithm (base, expansion, algorithm)

baseVecExpand(n,c,b)

image thumbnail

updated 2 years ago

voice encryption by andi yusuf

encrypt your voice using OTP algorithm (communications, signal processing, xor)

AddDatabase(varargin)

GrafikDekripsi(varargin)

GrafikEnkripsi(varargin)

image thumbnail

updated 2 years ago

Deploying a Shared Library by Peter Webb

Example code for "Deploying Shared Libraries" posting in the "Art of MATLAB" blog. (blog, deployment, cipher)

decrypt(ciphertext, key)

encrypt(plaintext, key)

vigenere

image thumbnail

updated 5 years ago

Modular Inverse by G. Levin

Finds the modular inverse over finite (Galois) field. (cryptography, finite field, galois)

y=mulinv(x,p)

image thumbnail

updated 8 years ago

MATLAB for Cryptography by andi yusuf

bent function for test s-box. (bent function, cryptography, sbox)

bent(sbox,input,z,file2)

convert(file)

image thumbnail

updated almost 11 years ago

Basic String Cryptography by Bill Higley

A couple of simple cryptography techniques. (encode, string, cryptography)

cryptoshift(in,shift)

cryptosubcode(in)

cryptosubdecode(in,key)

Contact us