Giter Site home page Giter Site logo

manjushanair's Projects

ehr-on-blockchain icon ehr-on-blockchain

A Electronic Health Records system on hyperledger fabric maintained by consortium of hospitals for patients.

encryption-decryption-software icon encryption-decryption-software

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Encryption provide us high security and privacy on our chat/ messages ,or in sharing any confidential data on any social media . Lets take an example : if I want to send your bank no. password or any other legal pin or code, we can't trust on any messenger. But what happened if we encrypt this messages. Then no one can read this , even can't understand. Now turn of Decryption Decryption is a process of converting encrypted text back to normal text. So the people have this software and password, can ready it easily . Feel safe and secure with any messages ,keep privacy. Now, turn to discuss how can we use this tool, means uses - 1. Its is specially designed for our Nibba-Nibbi type of person, they can use this tool for chatting . This tool keep there privacy . 2. You can message to your crush (girlfriend /boyfriend ) at any time ,without fear of reading this message by anyone else. 3. With the help of this tool you can share confidential data like passwords email, pin, ATM number with full privacy . 4. Or there are many method in which we can use this tool. 5. So please don't forget to comment me how you are going to use this tool. The encryption and decryption come under cryptography:- What is cryptography? Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email. Cryptography techniques Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques such as microdots, merging words with images and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. History of cryptography The word "cryptography" is derived from the Greek kryptos, meaning hidden. The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing."

encryption-decryption-with-steganography icon encryption-decryption-with-steganography

Information exchange has always been an important aspect of our lives, and with the rapid advancement of information and communication technology, communication and information exchange have become much easier and faster, but data security and privacy have become a major concern for us. Cryptography and Steganography are two popular data hiding practices that also can be combined to enhance data security. Because of recent advancements in steganalysis, one can easily reveal the existence of secreted information in carrier files. So this project aims to introduce a new method of steganography for communication between two private parties. We used a merged technique for data security that employs both cryptography and steganography techniques to enhance information security. In cryptography, we are using the RSA algorithm for the process of key generation and information encryption decryption. And in Steganography we are using Image Steganography for hiding the encrypted data. Image Steganography refers to the technique of hiding the presence of data within an image file, whereas cryptography is related to the act of transforming plain text into incomprehensible text and vice versa. Cryptography guarantees privacy whereas Steganography guarantees secrecy. We have also used base 64 and SHA-256, which is a patented cryptographic hash function. We are hiding the encrypted data in a distinct image file to securely send over the network without any suspicion of the data being hidden. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.

ethdkg icon ethdkg

Ethereum-based Distributed Key Generation Protocol

ethercis icon ethercis

START HERE: Documentation, internals and installation material, support info etc. Please post ISSUES here as well, thanks!

face_recognition icon face_recognition

The world's simplest facial recognition api for Python and the command line

fact icon fact

FaaS Application Component Tracer - Fact Backend

fingerprinting_radios_w_ml icon fingerprinting_radios_w_ml

The key idea behind radio fingerprinting is to extract unique patterns (or features) and use them as signatures to identify devices (or more precisely ID a radio embedded within a device).

fork-me icon fork-me

Yeah, right. FORK ME!!! Once you fork me, I help you learn forking.

frameworks icon frameworks

Sample code and build environments for MPC frameworks

ganache icon ganache

Personal blockchain for Ethereum development

glyptodon icon glyptodon

Since I keep making strange pseudo-cryptography tools, here's another one. Glyptodon is an encryption program not unlike dirKey, but written in python and it uses what I call a "Hash split" key generation process to ensure that it's fairly hard to break into files you've encrypted with it. At some point I might make a tool to merge this and stegodon together if I get even more bored.

gopaque icon gopaque

Go implementation of OPAQUE (hidden password user registration and auth)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.