The Repository introduces a direct implementaion for the Cryptography, Network Security Concepts and the Classical Encryption Techniques
We introduce a package with a fully completed techniques and algorithms for Managing Security Attacks and Services e.g. (Symmetric Cipher Model, Hill Cipher, Polyalphabetic, Transposition Techniques, etc...)
- Ceaser algorithm
- Monoalphabetic algorithm
- Playfair algorithm
- Hill Cipher algorithm
- Polyalphabetic techniques
- Transposition techniques
- AES algorithm
- Extended Euclidean algorithm
- RSA Algorithm.
- Diffie-Hellman Key Exchange Algorithm.
- EL Gamal Algorithm.
- Ceaser algorithm
- Monoalphabetic algorithm
- Playfair algorithm
- Hill Cipher algorithm
- Polyalphabetic techniques
- Repeating Key
- Auto Key
- Transposition techniques
- RailFence
- Columnar
- AES algorithm
- Extended Euclidean algorithm
- RSA Algorithm.
- Diffie-Hellman Key Exchange Algorithm.
- EL Gamal Algorithm.