This is a coding assignment as part of Computer Security subject. It does analysis of Avalanche Effect in DES and Triple DES
-
Updated
May 20, 2020 - Python
This is a coding assignment as part of Computer Security subject. It does analysis of Avalanche Effect in DES and Triple DES
Checking Avalanche effect in blowfish algorithm using pycrypto implementation
A simple app to demonstrate the power of the DESfiddle package
A custom Python-based Substitution-Permutation Network (SPN) cipher implementation featuring an Avalanche Effect testing suite for educational cryptography.
Custom block cipher (SPN network) in Python designed to secure logistics tracking codes. Includes a GUI and built-in cryptographic analysis tools.
Rust TUI demonstrating the avalanche effect in cryptographic hash functions - how a single bit change drastically alters the output
Avalanche Drain
Browser-based SHA-256 vs SHA3-256 vs BLAKE3 internals — live avalanche analysis, Merkle-Damgård/sponge/tree construction diagrams, and timing benchmarks. Part of crypto-lab.
Browser-based demo of cryptographic hash functions — SHA-256, SHA3-256, and BLAKE3. Live avalanche effect visualizer, length extension attack against SHA-256, and why HMAC exists. Hash functions are the silent foundation of every other primitive.
Add a description, image, and links to the avalanche-effect topic page so that developers can more easily learn about it.
To associate your repository with the avalanche-effect topic, visit your repo's landing page and select "manage topics."