A curated list of cryptography resources and links.
Go to file
snyk-bot 9aee770fd4 fix: package.json & .snyk to reduce vulnerabilities
The following vulnerabilities are ignored:
- https://snyk.io/vuln/npm:string:20170907

Latest report for sobolevn/awesome-cryptography:
https://snyk.io/test/github/sobolevn/awesome-cryptography
2017-11-16 20:29:28 +00:00
.editorconfig .editorconfig fixed 2016-06-21 18:25:17 +03:00
.gitattributes Added tests and styleguide. 2016-05-25 21:02:12 +03:00
.gitignore Travis file updated, since it was invalid. 2016-05-25 21:24:35 +03:00
.snyk fix: package.json & .snyk to reduce vulnerabilities 2017-11-16 20:29:28 +00:00
.travis.yml Changes Travis notification rules 2017-10-22 12:48:09 +03:00
awesome-crypto.png Adds logo 2017-07-14 15:19:30 +03:00
CODE_OF_CONDUCT.md Added link validation and removed invalid links 2016-06-21 18:21:13 +03:00
CONTRIBUTING.md Replaces npm with yarn in CONTRIBUTING 2017-09-30 09:12:28 +03:00
LICENSE.md Added License file [ci skip] 2016-09-30 13:13:05 +03:00
package.json fix: package.json & .snyk to reduce vulnerabilities 2017-11-16 20:29:28 +00:00
README.md Added Proteus library (#51) 2017-11-15 15:52:30 +03:00
yarn.lock Adds alive link validation 2017-08-07 16:00:37 +03:00

Awesome Cryptography Awesome

Awesome Cryptography

Build Status Join the chat at https://gitter.im/sobolevn/awesome-cryptography

Follow us on twitter

A curated list of cryptography resources and links.

Contents


Theory

Algorithms

Symmetric encryption

  • 3DES - Symmetric-key block cipher (or Triple Data Encryption Algorithm (TDEA or Triple DEA), which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
  • AES - Symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption (also known as Rijndael).
  • Blowfish - Symmetric-key block cipher, designed in 1993 by Bruce Schneier. Notable features of the design include key-dependent S-boxes and a highly complex key schedule.

Asymmetric encryption

  • RSA - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.

Hash functions

  • MD5 - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
  • SHA1 - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
  • SHA2 - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.

Articles

Books

Courses

  • Applied Cryptography - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
  • Crypto Strikes Back! - This talk will cover crypto vulnerabilities in widely-deployed systems and how the smallest oversight resulted in catastrophe.
  • Cryptography - A practical oriented course in Cryptography by University of Maryland College Park.
  • Cryptography - Stanford University - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
  • Cryptography I - The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems.
  • Cybrary Cryptography - This online course we will cover how cryptography is the cornerstone of security, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access.
  • Journey into cryptography - The course of cryptography by Khan Academy.
  • Practical Aspects of Modern Cryptography - Practical Aspects of Modern Cryptography, Winter 2006 University of Washington CSE.
  • Theory and Practice of Cryptography - Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.

Tools

Standalone

  • Bcrypt - Cross-platform file encryption utility.
  • blackbox - safely store secrets in Git/Mercurial/Subversion.
  • certbot - Previously the Let's Encrypt Client, is EFF's tool to obtain certs from Let's Encrypt, and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
  • cryptomator - Multi-platform transparent client-side encryption of your files in the cloud.
  • gpg - Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features for easy integration with other applications.
  • ironssh - End-to-end encrypt transferred files using sftp/scp and selectively share with others. Automatic key management works with any SSH server. Encrypted files are gpg compatible.
  • Nipe - Nipe is a script to make Tor Network your default gateway.

Plugins

Git

  • git-crypt - Transparent file encryption in git.
  • git-secret - Bash-tool to store your private data inside a git repository.

Frameworks and Libs

C

  • crypto-algorithms - Basic implementations of standard cryptography algorithms, like AES and SHA-1.
  • libgcrypt - Cryptographic library developed as a separated module of GnuPG.
  • libsodium - Modern and easy-to-use crypto library.
  • libtomcrypt - Fairly comprehensive, modular and portable cryptographic toolkit.
  • monocypher - small, portable, easy to use crypto library inspired by libsodium and TweetNaCl.
  • NaCl - High-speed library for network communication, encryption, decryption, signatures, etc.
  • OpenSSL - TLS/SSL and crypto library.
  • PolarSSL - PolarSSL makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint.
  • RHash - Great utility for computing hash sums.
  • themis - High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption). Ported on many languages and platforms, suitable for client-server infastructures.
  • tiny-AES128-C - Small portable AES128 in C.
  • wolfSSL - Small, fast, portable implementation of TLS/SSL for embedded devices to the cloud.
  • xxHash - Extremely fast hash algorithm.

C++

  • Botan - Cryptography library written in C++11.
  • cryptopp - Crypto++ Library is a free C++ class library of cryptographic schemes.
  • HElib - Software library that implements homomorphic encryption (HE).
  • Nettle - Low-level cryptographic library.
  • s2n - Implementation of the TLS/SSL protocols.

C-sharp

  • Bouncy Castle - All-purpose cryptographic library.
  • libsodium-net - Secure cryptographic library, port of libsodium for .NET.
  • PCLCrypto - Provides cryptographic APIs over algorithms implemented by the platform, including exposing them to portable libraries.
  • SecurityDriven.Inferno - .NET crypto done right.
  • StreamCryptor - Stream encryption & decryption with libsodium and protobuf.

Clojure

  • buddy-core - Cryptographic Api.
  • clj-crypto - Wrapper for Bouncy Castle.
  • pandect - Fast and easy-to-use Message Digest, Checksum and HMAC library for Clojure.

Common Lisp

  • crypto-shortcuts - Collection of common cryptography functions.
  • ironclad - Collection of common crypto shortcuts.
  • trivial-ssh - SSH client library for Common Lisp (Built on libssh2).

Delphi

  • DelphiEncryptionCompendium - Cryptographic library for Delphi.
  • LockBox - LockBox 3 is a Delphi library for cryptography.
  • SynCrypto - Fast cryptographic routines (hashing and cypher), implementing AES, XOR, RC4, ADLER32, MD5, SHA1, SHA256 algorithms, optimized for speed.
  • TForge - TForge is open-source crypto library written in Delphi, compatible with FPC.

Elixir

  • cipher - Elixir crypto library to encrypt/decrypt arbitrary binaries.
  • cloak - Cloak makes it easy to use encryption with Ecto.
  • comeonin - Password authorization (bcrypt) library for Elixir.
  • elixir-rsa - :public_key cryptography wrapper for Elixir.
  • elixir_tea - TEA implementation in Elixir.
  • ex_crypto - Elixir wrapper for Erlang :crypto and :public_key modules. Provides sensible defaults for many crypto functions to make them easier to use.
  • exgpg - Use gpg from Elixir.
  • pot - Erlang library for generating one time passwords compatible with Google Authenticator.
  • siphash-elixir - Elixir implementation of the SipHash hash family.

Erlang

  • crypto - Functions for computation of message digests, and functions for encryption and decryption.
  • public_key - Provides functions to handle public-key infrastructure.

Go

  • crypto - Official Website Resources.
  • cryptoballot - Cryptographically secure online voting.
  • dedis/crypto - Advanced crypto library for the Go language.
  • dkeyczar - Port of Google's Keyczar cryptography library to Go.
  • gocrypto - Example source code for the Practical Crypto with Go book.
  • goThemis - Go wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Haskell

Haxe

JavaScript

  • asmCrypto - JavaScript implementation of popular cryptographic utilities with performance in mind.
  • bcrypt-nodejs - Native implementation of bcrypt for NodeJS.
  • cifre - Fast crypto toolkit for modern client-side JavaScript.
  • closure-library - Google's common JavaScript library.
  • cryptico - Easy-to-use encryption system utilizing RSA and AES for javascript.
  • crypto-js - JavaScript library of crypto standards.
  • cryptojs - Provide standard and secure cryptographic algorithms for NodeJS.
  • forge - Native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps.
  • javascript-crypto-library - JavaScript Crypto Library provides web developers with an extensive and efficient set of cryptographic functions.
  • js-nacl - Pure-Javascript High-level API to Emscripten-compiled libsodium routines.
  • jsencrypt - Javascript library to perform OpenSSL RSA Encryption, Decryption, and Key Generation.
  • JShashes - Fast and dependency-free cryptographic hashing library for node.js and browsers (supports MD5, SHA1, SHA256, SHA512, RIPEMD, HMAC).
  • jsrsasign - The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation.
  • jsThemis - Javascript wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
  • libsodium.js - libsodium compiled to pure JavaScript, with convenient wrappers.
  • node.bcrypt.js - bcrypt for NodeJS.
  • OpenPGP.js - OpenPGP implementation for JavaScript.
  • PolyCrypt - Pure JS implementation of the WebCrypto API.
  • rusha - High-performance pure-javascript SHA1 implementation suitable for large binary data, reaching up to half the native speed.
  • sjcl - Stanford Javascript Crypto Library.
  • URSA - RSA public/private key OpenSSL bindings for Node.

Java

  • Apache Shiro - Performs authentication, authorization, cryptography and session management.
  • Bouncy Castle - All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
  • Flexiprovider - Powerful toolkit for the Java Cryptography Architecture.
  • Google Keyczar - Easy to use, yet safe encryption framework with key versioning.
  • Google Tink - A small crypto library that provides a safe, simple, agile and fast way to accomplish some common crypto tasks.
  • Java Themis - Java/Android wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
  • keywhiz - A system for distributing and managing secrets.
  • pac4j - Security engine.
  • scrypt - Pure Java implementation of the scrypt key derivation function and a JNI interface to the C implementations, including the SSE2 optimized version.

Julia

  • Crypto.jl - Library that wraps OpenSSL, but also has pure Julia implementations for reference.
  • MbedTLS.jl - Wrapper around the mbed TLS and cryptography C libary.
  • Nettle.jl - Julia wrapper around nettle cryptographic hashing/ encryption library providing MD5, SHA1, SHA2 hashing and HMAC functionality, as well as AES encryption/decryption.
  • SHA.jl - Performant, 100% native-julia SHA1, SHA2-{224,256,384,512} implementation.

Lua

  • lua-lockbox - Collection of cryptographic primitives written in pure Lua.
  • LuaCrypto - Lua bindings to OpenSSL.

Objective-C

  • CocoaSecurity - AES, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, Base64, Hex.
  • ObjC Themis - ObjC wrapper on Themis for iOS and MacOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
  • ObjectivePGP - ObjectivePGP is an implementation of OpenPGP protocol for iOS and macOS. OpenPGP is the most widely used email encryption standard.
  • RNCryptor - CCCryptor (AES encryption) wrappers for iOS and Mac.

PHP

  • halite - Simple library for encryption using libsodium.
  • libsodium-laravel - Laravel Package Abstraction using libsodium.
  • PHP Encryption - Library for encrypting data with a key or password in PHP.
  • PHP Themis - PHP wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
  • TCrypto - TCrypto is a simple and flexible PHP 5.3+ in-memory key-value storage library.

Python

  • bcrypt - Modern password hashing for your software and your servers.
  • charm - Framework for rapidly prototyping cryptosystems.
  • cryptography - Python library which exposes cryptographic recipes and primitives.
  • cryptopy - Pure python implmentation of cryptographic algorithms and applications.
  • hashids - Implementation of hashids in Python.
  • paramiko - Python implementation of the SSHv2 protocol, providing both client and server functionality.
  • Privy - An easy, fast lib to correctly password-protect your data.
  • pycryptodome - Self-contained Python package of low-level cryptographic primitives.
  • PyElliptic - Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish.
  • pynacl - Python binding to the Networking and Cryptography (NaCl) library.
  • pythemis - Python wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

R

  • rscrypt - Package for a collection of scrypt cryptographic functions.

Ruby

  • bcrypt-ruby - Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords.
  • RbNaCl - Ruby binding to the Networking and Cryptography (NaCl) library.
  • Ruby Themis - Ruby wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Rust

  • octavo - Highly modular & configurable hash & crypto library.
  • proteus - Axolotl protocol implementation, without header keys, in Rust.
  • ring - Safe, fast, small crypto using Rust & BoringSSL's cryptography primitives.
  • rust-crypto - Mostly pure-Rust implementation of various cryptographic algorithms.
  • rust-openssl - OpenSSL bindings for Rust.
  • rustls - Rustls is a new, modern TLS library written in Rust.
  • sodiumoxide - Sodium Oxide: Fast cryptographic library for Rust (bindings to libsodium).
  • suruga - TLS 1.2 implementation in Rust.
  • webpki - Web PKI TLS X.509 certificate validation in Rust.

Scala

  • scrypto - Cryptographic primitives for Scala.

Swift

  • CryptoSwift - Crypto related functions and helpers for Swift implemented in Swift programming language.
  • IDZSwiftCommonCrypto - Wrapper for Apple's CommonCrypto library written in Swift.
  • OpenSSL - Swift OpenSSL for OS X and Linux.
  • SweetHMAC - Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.
  • Swift-Sodium - Swift interface to the Sodium library for common crypto operations for iOS and OS X.
  • SwiftSSL - Elegant crypto toolkit in Swift.
  • SwiftThemis - Swift wrapper on Themis for iOS and MacOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).

Resources

Blogs

  • A Few Thoughts on Cryptographic Engineering - Some random thoughts about crypto.
  • Bristol Cryptography Blog - Official blog for the University of Bristol cryptography research group. It's a group blog, primarily targeted towards cryptographers and crypto students.
  • Charles Engelke's Blog - WebCrypto Blog Posts.
  • Root Labs rdist - Nate Lawson and his co-authors write on a variety of topics including hardware implementation, cryptographic timing attacks, DRM, and the Commodore 64.
  • Schneier on security - One of the oldest and most famous security blogs. Bruce covers topics from block cipher cryptanalysis to airport security.

Mailing lists

  • metzdowd.com - "Cryptography" is a low-noise moderated mailing list devoted to cryptographic technology and its political impact.
  • Modern Crypto - Forums for discussing modern cryptographic practice.
  • randombit.net - List for general discussion of cryptography, particularly the technical aspects.

Web-tools

  • Cryptolab - is a set of cryptography related tools.
  • CrypTool - Great variety of ciphers, encryption methods and analysis tools are introduced, often together with illustrated examples.
  • CyberChef - a web app for encryption, encoding, compression, and data analysis.
  • keybase.io - Keybase maps your identity to your public keys, and vice versa.

Web-sites

  • Cryptography Stackexchange - Cryptography Stack Exchange is a question and answer site for software developers, mathematicians and others interested in cryptography.
  • Cryptopals Crypto Challenges - A series of applied cryptography challenges, starting from very basic challenges, such as hex to base 64 challanges, and gradually increasing the difficulty up to abstract algebra.
  • Garykessler Crypto - An Overview of Cryptography.
  • IACR - The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
  • Learn Cryptography - Dedicated to helping people understand how and why the cryptographic systems they use everyday without realizing work to secure and protect their privacy.
  • Subreddit of Cryptography - This subreddit is intended for links and discussions surrounding the theory and practice of strong cryptography.
  • WebCryptoAPI - This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption.

Contributing

Your contributions are always welcome! Please take a look at the contribution guidelines first.

License

awesome-cryptography by @sobolevn

To the extent possible under law, the person who associated CC0 with awesome-cryptography has waived all copyright and related or neighboring rights to awesome-cryptography.

You should have received a copy of the CC0 legalcode along with this work. If not, see https://creativecommons.org/publicdomain/zero/1.0/.