Cryptography - PSJoshi/Notes GitHub Wiki
-
Crypto app to encrypt file/message - https://github.com/gautamk/py-crypto-agile
-
Bench marking crypto libraries - https://github.com/gautamk/cryptobench
-
Crypto-agility - https://cryptosense.com/blog/achieving-crypto-agility
-
Ecrypt program - https://www.ecrypt.eu.org/
-
NESSIE reports - https://www.cosic.esat.kuleuven.be/nessie/reports/
-
List of NESSIE submissions - https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html
-
eStream testing framework - https://www.ecrypt.eu.org/stream/perf/
-
Encrypt stream cipher project - https://www.ecrypt.eu.org/stream/
-
European Network of Excellence in Cryptology reports - https://cordis.europa.eu/project/id/216676/reporting
-
crypto challenges - https://cryptopals.com/
-
non-SMTP cryptographic email system - https://www.confidantmail.org/docs/introduction.html
Cryptographic algorithm evaluation
- Cryptographic algorithm metrics - https://csrc.nist.gov/csrc/media/publications/conference-paper/1997/10/10/proceedings-of-the-20th-nissc-1997/documents/128.pdf
- Survey of cryptographic algorithms - https://thesai.org/Downloads/Volume8No11/Paper_41-A_Survey_on_the_Cryptographic_Encryption_Algorithms.pdf
- Cryptographic strength evaluation of key scheduling algorithms - https://downloads.hindawi.com/journals/scn/2020/3189601.pdf
- Performance analysis of data encryption algorithms - https://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/
- Encryption techniques performance evaluation - https://crypto.stackexchange.com/questions/1258/encryption-technique-performance-evaluation
- Performance metrics for crypto algorithms - https://crypto.stackexchange.com/questions/67667/performance-metrices-of-cryptographic-algorithms
- OWASP testing cryptography guide - https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05e-Testing-Cryptography.md
- ASD Crypto evaluation program - https://www.cyber.gov.au/acsc/view-all-content/programs/asd-cryptographic-evaluation-program
Using Machine learning/deep learning for cryptography
- Practical cryptography book -https://github.com/nakov/Practical-Cryptography-for-Developers-Book/
- Cryptanalysis using ML - https://github.com/rdar-lab/MLCryptoAnalyzer
- Cryptanalysis and security assessment of the modern symmetric key algorithms using neural networks - https://github.com/NVukobrat/Cryptanalysis-and-security-assessment-of-the-modern-symmetric-key-algorithms-using-neural-networks
- CNN based cryptography - https://github.com/riacheruvu/neural-cryptography
Random number generation evaluation
- NIST SP 800-22 random no generator test suite download - https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software
- NIST SP800-22 PRNG test suite using python - https://github.com/dj-on-github/sp800_22_tests
- Random number generator principles and practices book examples - https://github.com/dj-on-github/RNGBook_Code
- Python implementation of NIST's A Statistical Test Suite - https://github.com/stevenang/randomness_testsuite
- Improved version of the NIST Statistical Test Suite (STS) - https://github.com/arcetri/sts
- Python package for the nist-provided SP 800-90B entropy assesment method - https://github.com/hnj2/sp800_90b
- Entropy assessment - https://github.com/usnistgov/SP800-90B_EntropyAssessment
- https://lightshipsec.com/nist-800-90b-concepts/
- NIST statistical test suite - https://github.com/terrillmoore/NIST-Statistical-Test-Suite
Blogs
- https://blog.cryptographyengineering.com/useful-cryptography-resources/
- https://cryptosense.com/blog
Interesting
- Guidelines for cryptography - https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-cryptography
- Exploring weak ciphers - https://electricenergyonline.com/energy/magazine/779/article/Security-Sessions-Exploring-Weak-Ciphers.html
- Practical cryptography for developers - https://github.com/nakov/practical-cryptography-for-developers-book
Lightweight ciphers (LWC)
- Design and implementation of lightweight and secure cryptographic algorithms for embedded devices - https://tel.archives-ouvertes.fr/tel-03101356/document
- Review of IoT Security challenges and LWC implementations - https://www.researchgate.net/publication/359650542_An_Extensive_review_on_IoT_security_challenges_and_LWC_implementation_on_tiny_hardware_for_node_level_security_evaluation
Courses
- https://github.com/samuel-lucas6/CSEC-507-Applied-Cryptology
- https://github.com/Amey-Thakur/CRYPTOGRAPHY-AND-SYSTEM-SECURITY-AND-SYSTEM-SECURITY-LAB
- https://github.com/AxlLind/coursera-cryptography-I
- Design of an Undergraduate Cryptography Course with Python and SageMath - https://repository.lib.ncsu.edu/bitstream/handle/1840.20/39737/etd.pdf?sequence=1&isAllowed=y
Guidelines
- Algorithm selection guidelines https://github.com/samuel-lucas6/Cryptography-Guidelines