Station-to-Station authentication key exchange protocol.
-
Updated
Jan 12, 2021 - Java
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Station-to-Station authentication key exchange protocol.
针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。
🐧 The Linux Simulator
AES algorithm implementation in Java
Simulation of SDA (offline static data authentication) and DDA (dynamic data authentication)
This repository is intended for the java encryption with the use of AES algorithm..
Skills and knowledge required to be a successful security engineer in transaction security research.
Encryption And Decryption Using Different Symmetric And Asymmetric Algorithms.
An android application where you can record the following account information: username, platform, passwords to an offline database.
Even the Cat Can be Undefeated
It includes code to encrypt message into cipher and again decrypt that cipher to original text using pocket AES.
Complete Kerberos protocol implementation with hybrid RSA 2048-bit/AES 256-bit encryption. Features Key Distribution Center (AS + TGS), ticket-based SSO, mutual client-server authentication, session key generation, JavaFX GUI, CSV user database, comprehensive logging, and 5-minute ticket expiration. Educational Active Directory clone.
Collection of practical codes for Savitribai Phule Pune University's Information Security Laboratory (310258) .
Cryptography Android application code samples / cipher collection for app users
Enterprise file integrity monitoring system using RSA digital signatures, X.509 certificates, and cryptographic hashing (MD5/SHA-256). Features AES encryption, tamper detection, and audit logging.
"Password Vault" - A project as part of a course for running code in a secure environment. JCT.
University(SevGU) projects. Several encryption algorithms implementations
Data concealing in vector images
This repository stores documentation for my Java Password Manager Desktop App
Created by The cybersecurity community