ANUBIS Crypto Engine (Verilog)

  •        176

This is a hardware crypto engine for the Anubis block cipher written in Verilog.



Related Projects

keyshuffling - Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

  •    TeX

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in order to gain early code execution. The attack utilizes the block shuffling vulnerability of the ECB cipher mode to rearrange keys in the Nintendo 3DS's encrypted keystore. Because the shuffled keys will deterministically decrypt the encrypted firmware binary to incorrect plaintext data and execute it, and because the device's memory contents are kept between hard reboots, it is possible to reliably reach a branching instruction to a payload in memory. This payload, due to its execution by a privileged processor and its early execution, is able to extract the hash of hardware secrets necessary to decrypt the device's encrypted keystore and set up a persistent exploit of the system. Information in this article (especially the keyshuffling vulnerability) is original, independent work unless cited otherwise. Note that the keyshuffling vulnerability detailed here is the same one documented publicly by much of this team including "stuckpixel" (also known as "dark_samus") on sites such as 3DBrew. Additionally, note that the persistence vulnerability detailed here is the same one documented publicly as "arm9loaderhax" by "plutoo", "derrek", and "smea" at the 2015 32c3 conference.


  •    DotNet

Random Number Generators for .Net written in C# Regular use: * MersenneTwister 3 CNG Cryptographically secure RNG: * CTR_DRBG * DSS * DUAL Elliptic Curve Concurrency: * Thread-Safe Non-repetitive RNG Encryption Cipher: * Anubis (successor of Rijndael)


  •    Perl

TclDES is a pure-Tcl implementation of the Data Encryption Standard (DES) and Triple-DES (3DES). It supports all DES operation modes: Electronic Code Block (ECB), Cipher Block Chaining (CBC) , Output Feedback (OFB), and Cipher Feedback (CFB).

.NET Crypto Library (Devv.Core.Crypto)

  •    DotNet

Devv.Core.Crypto is an encryption library written in VB.NET. It supports all the major Cipher and Hash algorithms: RC2, DES, TripleDES, AES (Rijndael), SHA and MD5. The configuration can be done using the application settings file, and it's quite easy to integrate. Compatible ...

Affine cipher school project


Affine cipher crypt with block = 10

forge - A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps

  •    Javascript

A native implementation of TLS (and various other cryptographic tools) in JavaScript. The Forge software is a fully native implementation of the TLS protocol in JavaScript, a set of cryptography utilities, and a set of tools for developing Web Apps that utilize many network resources.

Monoalphabetic Substitution Cipher


Monoalphabetic Substitution Cipher is project that implement Monoalphabetic Substitution Cipher windows application with VB.NET and C# (.NET 2.0) for basic encryption/decryption example.

Rail Fence Cipher

  •    CSharp

Rail Fence Cipher is project that implement Rail Fence Cipher windows application with VB.NET and C# (.NET 2.0) for basic encryption/decryption example.



This project is aiming to develop an encryption application that enables the user to encrypt and decrypt text (primarily) and files (in the future). The project will be written in VB.NET and called Consus.

cipherhub - encrypt messages based on ssh public keys with easy import from github

  •    Javascript

It can be frustrating and annoying to communicate with somebody using public key cryptography since setting up PGP/GPG is a hassle, particularly managing keyrings and webs of trust.and it will fetch their public keys from github, storing the key locally for next time.

wolfssl - (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud

  •    C

The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments - primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments as well because of its royalty-free pricing and excellent cross platform support.

Cloakify - CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings; Evade DLP/MLS Devices; Defeat Data Whitelisting Controls; Social Engineering of Analysts; Evade AV Detection

  •    Python

CloakifyFactory & the Cloakify Toolset - Data Exfiltration & Infiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Defeat Data Whitelisting Controls; Evade AV Detection. Text-based steganography using lists. Convert any file type (e.g. executables, Office, Zip, images) into a list of everyday strings. Very simple tools, powerful concept, limited only by your imagination. For a quick start on CloakifyFactory, see the cleverly titled file "README_GETTING_STARTED.txt" in the project for a walkthrough.



An open source game SDK for the Cipher Game Engine.


  •    C

ccrypt is a command-line utility for encrypting and decrypting files and streams. It replaces the old Unix crypt utility. Ccrypt provides strong encryption, based on the Rijndael cipher, the cipher that is also used in the Advanced Encryption Standard.

Dynamics Ax CipherLib


The Dynamics Ax CipherLib is a simple X.509 certificate based cipher implementation that allows to encrypt/decrypt S/MIME or XML messages with Dynamics Ax 4.0,

xortool - A tool to analyze multi-byte xor cipher

  •    Python

A tool to analyze multi-byte xor cipher

Cryptomak Cipher Tools

  •    PHP

Cryptomak contains cipher and tools for encryption utility written in php such as substitution, vigenere, affine, transposition and index of coincidence. It is powered by Phrame platform which implements MVC design and Smarty template engine.

Android-Goldfinger - Android library to simplify Fingerprint authentication implementation.

  •    Java

You can see all Goldfinger methods here. The CryptoObject is locked when created and it is unlocked when the user successfully authenticates. Once it is unlocked, you can use it to cipher data.

Decodify - Detect and decode encoded strings, recursively.

  •    Python

Boom! Thats what Decodify does. It automatically detects the encoding and decodes it and it does that recursively. Warning: Decodify uses third party web services for MD5, SHA1 & SHA2 hash lookups. If you are dealing with sensitive data, you are advised to use the -s option which will prevent Decodify to use these services.