Skip to content

A Package for Implementing Network Security Algorithms and Techniques

Notifications You must be signed in to change notification settings

KAN-Team/Network-Security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 

Repository files navigation

Network-security

The Repository introduces a direct implementaion for the Cryptography, Network Security Concepts and the Classical Encryption Techniques

Package Overview

We introduce a package with a fully completed techniques and algorithms for Managing Security Attacks and Services e.g. (Symmetric Cipher Model, Hill Cipher, Polyalphabetic, Transposition Techniques, etc...)


Algorithms & Techniques Used

  • Ceaser algorithm
  • Monoalphabetic algorithm
  • Playfair algorithm
  • Hill Cipher algorithm
  • Polyalphabetic techniques
  • Transposition techniques
  • AES algorithm
  • Extended Euclidean algorithm
  • RSA Algorithm.
  • Diffie-Hellman Key Exchange Algorithm.
  • EL Gamal Algorithm.

Milestone 1:

  • Ceaser algorithm
  • Monoalphabetic algorithm
  • Playfair algorithm

Milestone 2:

  • Hill Cipher algorithm
  • Polyalphabetic techniques
    • Repeating Key
    • Auto Key
  • Transposition techniques
    • RailFence
    • Columnar

Milestone 3:

  • AES algorithm
  • Extended Euclidean algorithm

Milestone 4:

  • RSA Algorithm.
  • Diffie-Hellman Key Exchange Algorithm.
  • EL Gamal Algorithm.

About

A Package for Implementing Network Security Algorithms and Techniques

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages