This repo will house the source code for my Team's term wide game dev project for the CIS 410: Intro to Game Programming course at the University of Oregon.
-
Updated
Sep 25, 2020 - C#
This repo will house the source code for my Team's term wide game dev project for the CIS 410: Intro to Game Programming course at the University of Oregon.
Browser-based cryptography demos — deniable encryption to post-quantum. No backends. No accounts. Just the math.
Browser-based demo of ML-DSA (CRYSTALS-Dilithium), the lattice-based post-quantum digital signature scheme standardized as NIST FIPS 204 in August 2024. Sign, verify, and seal documents — quantum-resistant.
Browser demo for ML-KEM (CRYSTALS-Kyber), the post-quantum key encapsulation mechanism standardized as NIST FIPS 203 in August 2024.
Browser-based demo of Serpent-256, the AES finalist with the largest security margin — featuring encrypt/decrypt, round comparison visualization, and live performance benchmarks
Browser-based demo of the Double Ratchet Algorithm — the cryptographic protocol powering Signal, WhatsApp, and Google Messages. Live conversation with forward secrecy, break-in recovery, and key compromise simulation.
Browser-based Shamir's Secret Sharing visualizer — interactive polynomial graph, live Lagrange interpolation stepper, share checkboxes, and wrong-polynomial demo for the under-threshold case. Part of crypto-lab.
Browser-based demo of Shamir's Secret Sharing — split a secret into n shares, reconstruct from any k. Polynomial curve visualization, information-theoretic security proof, and AES key protection. Invented by Adi Shamir (Weizmann Institute, Israel) in 1979.
Browser-based Ed25519 keypair generation, signing, and signature verification — deterministic nonces, tamper detection, ZIP215 cofactor handling, and 64-byte compact signatures. Part of crypto-lab.
Browser-based demo of SLH-DSA (SPHINCS+), a hash-based post-quantum digital signature scheme standardized as NIST FIPS 205
Browser-based demo of hybrid post-quantum key exchange — X25519 + ML-KEM-768 running in parallel, exactly as deployed in Chrome 124+, Cloudflare, and Signal. Secure against both classical and quantum attackers.
Browser-based Poly1305 MAC demo — polynomial evaluation over GF(2¹³⁰−5), constant-time tag verification, key-reuse attack visualizer, and Polynomial Stepper. Part of crypto-lab.
Browser-based SHA-256 vs SHA3-256 vs BLAKE3 internals — live avalanche analysis, Merkle-Damgård/sponge/tree construction diagrams, and timing benchmarks. Part of crypto-lab.
Browser-based ChaCha20 stream cipher — quarter-round stepper, keystream visualizer, nonce reuse attack demo, and encrypt/decrypt playground. ARX design, no AES-NI required. Part of crypto-lab.
Browser-based demo of cryptographic hash functions — SHA-256, SHA3-256, and BLAKE3. Live avalanche effect visualizer, length extension attack against SHA-256, and why HMAC exists. Hash functions are the silent foundation of every other primitive.
Browser-based demo of differential cryptanalysis — the attack co-invented by Eli Biham and Adi Shamir (Israel, 1990) that broke DES. Live attack on a toy SPN cipher, DDT visualization, and the story of how Biham used his own attack to design Serpent.
Browser-based KDF benchmarking — live timing and memory comparison of HKDF, PBKDF2, scrypt, and Argon2id with adjustable cost parameters and bar chart visualization. Part of crypto-lab.
Add a description, image, and links to the browser-demo topic page so that developers can more easily learn about it.
To associate your repository with the browser-demo topic, visit your repo's landing page and select "manage topics."