All Questions
6 questions
8
votes
1
answer
5k
views
XOR Encryption, Decryption, and Cracking in Python
I have recently been working through a number of the Cryptopals Cryptography Challenges to try and improve my knowledge and understanding of both cryptography and Python. As five of the first six ...
4
votes
1
answer
105
views
Inversionless Lenstra ECM running way slower than it should
So I was coding Inversionless ECM using Prime Numbers: A computational perspective and when I finished and tried running my program it ran way, way slower than it is supposed to. I have no idea what I ...
5
votes
2
answers
431
views
ECDH implementation in Python (part 3)
After the first and second part, the primary feedback I got was to rename a lot of my variables as I used the same name for different local variables which is really confusing. I tried to hotfix that, ...
1
vote
1
answer
280
views
ECDH implementation in python (part 2)
I worked a while on my code I posted here to make it more flexible and hopefully a little bit more secure. My goal is to implement a secure library for elliptic curve cryptography.
...
21
votes
4
answers
44k
views
RSA algorithm implementation in Python 3
First, a reminder of the RSA algorithm and what my program implements:
Take two distinct, large primes p and q
Ideally these ...
1
vote
1
answer
870
views
Encrypting and decrypting strings using Caesar cipher
I was inspired by a solution in Think Python: How to Think Like a Computer Scientist. I structured mine (into two functions) according to it, and used the technique used in
...