These are the lab assignments performed during the course of cryptography
brute-force-attacks
digital-signature
hill-cipher
aes-algorithm
vigenere-cipher
affine-cipher
rail-cipher
euclidean-algorithm
rsa-algorithm
double-transposition-cipher
playfair-cipher
chinese-remainder-theorem
des-algorithm
multiplicative-cipher
udp-client-server
additve-inverse
multiplicative-inverse
additve-cipher
statistical-attack
pattern-attack
-
Updated
May 27, 2020 - Jupyter Notebook