A comprehensive cryptographic toolkit implementing industry-standard encryption algorithms with a focus on security, education, and real-world applicability.
Features β’ Quick Start β’ Algorithms β’ Security β’ Documentation β’ Contributing
In an era where data breaches cost companies millions and privacy is paramount, understanding and implementing proper encryption is crucial. This project bridges the gap between academic cryptography and practical implementation, providing:
- π Educational Value: Learn cryptography by doing, with detailed explanations
- π Production-Ready Code: Following NIST standards and security best practices
- π Performance Optimized: Benchmarked algorithms with performance metrics
- π‘οΈ Security First: Authenticated encryption, tamper detection, and secure key management
- π Comparative Analysis: Understand why AES replaced DES, when to use RSA vs symmetric encryption
| Algorithm | Mode | Security Level | Use Case | Status |
|---|---|---|---|---|
| AES-256 | GCM | π‘οΈ Military Grade | Bulk encryption, Files, Messages | β Production Ready |
| RSA-2048/4096 | OAEP | π High | Key exchange, Digital signatures | β Production Ready |
| Hybrid | RSA+AES | π Optimal | Large files, Secure communication | β Production Ready |
| DES | CBC | Educational only |
- π Hybrid Encryption System: Combines RSA's security with AES's speed
- β Authenticated Encryption (AEAD): Ensures both confidentiality and integrity
- π Advanced Key Management: Secure generation, storage, rotation, and destruction
- π‘οΈ Tamper Detection: Cryptographic verification of data integrity
- π² Cryptographically Secure RNG: For keys, nonces, and IVs
- π Performance Benchmarking: Compare algorithm speeds and security
- π§ͺ Comprehensive Test Suite: Unit, integration, and security tests
- π¨ Interactive CLI: User-friendly interface with colored output
- π Multiple Export Formats: JSON, Base64, PEM for keys
β
NIST-Compliant Algorithms β
Constant-Time Operations
β
Side-Channel Attack Protection β
Memory-Safe Key Handling
β
OAEP Padding (RSA) β
GCM Authentication (AES)
β
Unique Nonce Generation β
Secure Key Derivation
β
Anti-Tampering Mechanisms β
Timing Attack Mitigation