This repository will slowly get more and more cryptography code samples written in Java. Methods are related to Cryptography android application cipher method collection. Point of this repository is that users can find everything in one place, modify code, play with these methods in any way they want and this way learn how ciphers worked in the past and how they work these days. In short words this repository is meant to be educational.
This repository is part of this Android application: Google Play - Cryptography
Feel free to contribute or open issues!
- Ciphers
- Converters
- Encoding
- Hashes
- Random
- Certificates
- Signatures
- Installation
- Running tests
- External libraries
- Adding external library
- Notes
- Troubleshooting
- Contributions
- Authors
- Contributors
- License
Cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. Encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
Converters converts input from representation system A to representation system B and vice versa.
Encoding is used to represent data in ASCII string format by translating the data into selected encoding representation.
A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes.
Random generation is a process which, often by means of a random number generator (RNG), generates a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance.
In computer security, an attribute certificate, or authorization certificate (AC) is a digital document containing attributes associated to the holder by the issuer. When the associated attributes are mainly used for the purpose of authorization, AC is called authorization certificate. AC is standardized in X.509. RFC 5755 further specifies the usage for authorization purpose in the Internet.
mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).
- Download and install eclipse: https://www.eclipse.org/downloads/ or any other IDE.
- Download project source code by either cloning it with Git or by
Clone or download
menuDownload ZIP
option. - Open project in Eclipse
File
-Open projects from File System...
- Navigate to
/src
-cryptography
-Ciphers.java
and start play with it. Rest of the folder structure has method specific code and tests files for running automated tests.
I warmly recommend watching basic Eclipse tutorials if you are new to the topic.
- Make new branch.
- Push changes. (tests will be run with each push)
- Open pull request.
- Later tests are run by Github Actions workflow (
./.github/workflows/Tests.yml
).
- Right click on
TestRunner.java
- Click
Coverage As
- Select
1 Java Application
- If everything is fine result is
Tests success: true
- Included for Base32 and Base64 encoding methods.
- Included for many hashing algorithms.
- You can find all source code and details here: https://jacksum.loefflmann.net/en/download.html
core-1.58.0.0.jar | prov-1.58.0.0.jar | bcpg-jdk15on-1.58.0.0.jar | bcpkix-jdk15on-1.58.0.0.jar (Spongy Castle)
- Providing tons of newer strong Cryptographic methods. See https://rtyley.github.io/spongycastle/ and http://www.bouncycastle.org/java.html
- BouncyCastle signed cryptography provider
- BouncyCastle signed cryptography provider
- JUnit 4 jar and hamcrest core for Github Actions based test runs.
Every time new external jar library is added, it must be also added to build.xml
in a block seen below as example
<path id="Cryptography.classpath">
<pathelement location="bin"/>
<path refid="JUnit 4.libraryclasspath"/>
<pathelement location="jar/commons-codec-1.10.jar"/>
<pathelement location="jar/jacksum.jar"/>
<pathelement location="jar/core-1.58.0.0.jar"/>
<pathelement location="jar/prov-1.58.0.0.jar"/>
<pathelement location="jar/bcpkix-jdk15on-1.58.0.0.jar"/>
<pathelement location="jar/bcpg-jdk15on-1.58.0.0.jar"/>
<pathelement location="jar/org.junit_4.13.0.v20200204-1500.jar"/>
<pathelement location="jar/core-1.3.0.jar"/>
<pathelement location="jar/bcprov-jdk15on-170"/>
<pathelement location="jar/bcpkix-jdk15on-170"/>
</path>
Some ciphers or parts of ciphers originate from web sites, tutorials, repositories or other sources. There's unfortunately no links to original references.
Noticed at Mac with jdk1.8.0...
[java.security.InvalidKeyException: Illegal key size or default parameters]>
this could be due to crypto policy being limited at java config. To change this, go to:
cd /Library/Java/JavaVirtualMachines/jdk1.8.0_152.jdk/Contents/Home/jre/lib/security/
sudo nano java.security
and uncomment out crypto.policy=unlimited
:
Following did same trick but from code, so used this one:
import java.security.Security;
public class SomeClass {
public static void main(String[] args) {
Security.setProperty("crypto.policy", "unlimited");
}
}
- Please, write tests if you make something new.
- Open issue or make new branch and create pull request when problem is fixed.
- You are free to optimize code, make new branch and create pull request when ready.
- Norkator - Initial work - norkator
- Saurav Kumar - *Added Morse, Huffman, Compliment, Koblitz, EllipticCurve, VICsequencing, VIC * - SKR301
See repo license section or license file.