Skip to content

norkator/cryptography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cryptography Image 1

Cryptography

This repository will slowly get more and more cryptography code samples written in Java. Methods are related to Cryptography android application cipher method collection. Point of this repository is that users can find everything in one place, modify code, play with these methods in any way they want and this way learn how ciphers worked in the past and how they work these days. In short words this repository is meant to be educational.

This repository is part of this Android application: Google Play - Cryptography

Feel free to contribute or open issues!

Table of contents


Ciphers

Cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. Encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

Converters

Converters converts input from representation system A to representation system B and vice versa.

Encoding

Encoding is used to represent data in ASCII string format by translating the data into selected encoding representation.

Hashes

A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes.

Random

Random generation is a process which, often by means of a random number generator (RNG), generates a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance.

Certificates

In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the holder by the issuer. When the associated attributes are mainly used for the purpose of authorization, AC is called authorization certificate. AC is standardized in X.509. RFC 5755 further specifies the usage for authorization purpose in the Internet.

Signatures

mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).


Installation

  1. Download and install eclipse: https://www.eclipse.org/downloads/ or any other IDE.
  2. Download project source code by either cloning it with Git or by Clone or download menu Download ZIP option.
  3. Open project in Eclipse File - Open projects from File System...
  4. Navigate to /src - cryptography - Ciphers.java and start play with it. Rest of the folder structure has method specific code and tests files for running automated tests.

I warmly recommend watching basic Eclipse tutorials if you are new to the topic.

Running tests

Automatically

  1. Make new branch.
  2. Push changes. (tests will be run with each push)
  3. Open pull request.
  4. Later tests are run by Github Actions workflow (./.github/workflows/Tests.yml).

Manually

  1. Right click on TestRunner.java
  2. Click Coverage As
  3. Select 1 Java Application
  4. If everything is fine result is Tests success: true

External libraries

commons-codec-1.10.jar

  • Included for Base32 and Base64 encoding methods.

jacksum-1.7.0 (jacksum.jar)

core-1.58.0.0.jar | prov-1.58.0.0.jar | bcpg-jdk15on-1.58.0.0.jar | bcpkix-jdk15on-1.58.0.0.jar (Spongy Castle)

bcprov-jdk15on-170

  • BouncyCastle signed cryptography provider

bcpkix-jdk15on-170

  • BouncyCastle signed cryptography provider

org.junit_4.13.0.v20200204-1500.jar | core-1.3.0.jar

  • JUnit 4 jar and hamcrest core for Github Actions based test runs.

Adding external library

Every time new external jar library is added, it must be also added to build.xml in a block seen below as example

<path id="Cryptography.classpath">
    <pathelement location="bin"/>
    <path refid="JUnit 4.libraryclasspath"/>
    <pathelement location="jar/commons-codec-1.10.jar"/>
    <pathelement location="jar/jacksum.jar"/>
    <pathelement location="jar/core-1.58.0.0.jar"/>
    <pathelement location="jar/prov-1.58.0.0.jar"/>
    <pathelement location="jar/bcpkix-jdk15on-1.58.0.0.jar"/>
    <pathelement location="jar/bcpg-jdk15on-1.58.0.0.jar"/>
    <pathelement location="jar/org.junit_4.13.0.v20200204-1500.jar"/>
    <pathelement location="jar/core-1.3.0.jar"/>
    <pathelement location="jar/bcprov-jdk15on-170"/>
    <pathelement location="jar/bcpkix-jdk15on-170"/>
</path>

Notes

Some ciphers or parts of ciphers originate from web sites, tutorials, repositories or other sources. There's unfortunately no links to original references.

Troubleshooting

Noticed at Mac with jdk1.8.0...

[java.security.InvalidKeyException: Illegal key size or default parameters]>

this could be due to crypto policy being limited at java config. To change this, go to:

cd /Library/Java/JavaVirtualMachines/jdk1.8.0_152.jdk/Contents/Home/jre/lib/security/
sudo nano java.security

and uncomment out crypto.policy=unlimited: Cryptography Image 1

Following did same trick but from code, so used this one:

import java.security.Security;
public class SomeClass {
	public static void main(String[] args) {
        Security.setProperty("crypto.policy", "unlimited");
    }
}

Contributions

Rules?

  • Please, write tests if you make something new.

Found problem?

  • Open issue or make new branch and create pull request when problem is fixed.

Want to optimize code?

  • You are free to optimize code, make new branch and create pull request when ready.

Authors

Contributors

  • Saurav Kumar - *Added Morse, Huffman, Compliment, Koblitz, EllipticCurve, VICsequencing, VIC * - SKR301

License

See repo license section or license file.