Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

systemslibrarian/crypto-lab

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
52 Commits
 
 
 
 
 
 

Repository files navigation

Crypto Lab

Browser-based cryptography demos — no backends, no accounts, just the math.

A curated cryptography lab — from fundamentals to cutting-edge research

A curated collection of single-concept cryptography demonstrations. Each one isolates a real primitive or protocol and makes it interactive in the browser. Classic algorithms, post-quantum schemes, zero-knowledge proofs — all grounded in real specifications, not toy reimplementations.

Live → https://crypto-lab.systemslibrarian.dev/


Featured

Project Concept Primitives
Snow 2 Stream Cipher XChaCha20-Poly1305 · Argon2id · HKDF-SHA-256 · Steganography
Quantum Vault KpqC Post-Quantum AES-256-GCM · Shamir SSS · SMAUG-T · HAETAE

All Demos

Project Category Stack
AEGIS Gate Authenticated Encryption AEGIS-256 · AES Round Function · 6-State Sponge · Test Vectors
Kerberos v5 Authentication Protocol RFC 4120 · Needham-Schroeder · Lowe Attack · AES-256-CTS
Iron Letter Asymmetric Encryption ECIES P-256 · RSA-OAEP · AES-256-GCM
X3DH Wire Asynchronous Key Agreement X3DH · X25519 · HKDF-SHA-256 · Signal Protocol
Blind Sign Blind Signatures Chaum RSA · Schnorr EC · e-Cash · Unlinkability
Iron Serpent Block Cipher Serpent · AES-256 · SPN
World Ciphers Block Cipher Camellia · ARIA · SM4 · Kuznyechik
AES Modes Block Cipher Modes AES · AES-GCM · AES-CBC · Authenticated Encryption
Padding Oracle CBC Padding Oracle AES-CBC · PKCS#7 · Vaudenay 2002 · POODLE
BIKE Vault Code-Based KEM BIKE · QC-MDPC · Post-Quantum · KEM
HQC Vault Code-Based KEM HQC · Reed-Muller · Reed-Solomon · Post-Quantum
Commit Gate Commitment Schemes Hash Commitment · Pedersen · Binding & Hiding · Homomorphic Addition
DRBG Arena CSPRNG HMAC_DRBG · CTR_DRBG · Hash_DRBG · NIST SP 800-90A
Corrupted Oracle Backdoored RNG Dual_EC_DRBG · HMAC-DRBG · ChaCha20-DRBG · P-256
Dad Mode Morse Encrypted Morse AES-256-GCM · Argon2id · HKDF-SHA-256 · Ed25519
Shadow Vault Deniable Encryption Argon2id · ChaCha20-Poly1305 · SHA-256
Biham Lens Differential Cryptanalysis Differential Cryptanalysis · SPN · DDT · Chosen-Plaintext
Ed25519 Forge Digital Signatures Ed25519 · Deterministic Nonces · ZIP215 · Cofactor
ECDSA Forge Digital Signatures ECDSA · secp256k1 · RFC 6979 · Nonce Reuse
Curve Lens Elliptic Curves ECC · Curve25519 · ECDH · P-256
Format Ward Format-Preserving Encryption FF1 · FF3-1 · AES-256 · Tokenization
Ratchet Wire Forward-Secret Messaging Double Ratchet · X25519 · HKDF · AES-256-GCM
Babel Hash Hash Functions SHA-256 · SHA3-256 · BLAKE3 · HMAC
World Hashes Hash Functions SM3 · Streebog · Kupyna · SHA-256 · SHA-3
Hash Zoo Hash Internals SHA-256 · SHA3-256 · BLAKE3 · Merkle-Damgård · Sponge
SPHINCS+ Ledger Hash-Based Signatures SLH-DSA · SPHINCS+ · SHA-256 · FORS
LMS Ledger Stateful Hash-Based Signatures LMS · HSS · W-OTS+ · NIST SP 800-208
LMS/XMSS Hash-Based Signatures LMS · XMSS · HSS · NIST SP 800-208
Dead Sea Cipher Historical Cipher Substitution · Transposition · Atbash
Blind Oracle Homomorphic Encryption TFHE-rs
CKKS Lab Homomorphic Encryption CKKS · RLWE · Approximate FHE · Encrypted Inference
FHE Arena Homomorphic Encryption BGV/BFV · RLWE · Noise Budget · SIMD Batching
Hybrid Wire Hybrid Key Exchange X25519 · ML-KEM-768 · HKDF-SHA256 · AES-256-GCM
Harvest Vault Quantum Threat HNDL · Mosca's Theorem · Q-Day Timeline · PQC Migration
Oblivious Shelf IT-PIR Library Privacy XOR PIR · Chor et al. 1995 · 2-Server PIR · Privacy Audit
KDF Arena KDF Benchmarks HKDF · PBKDF2 · scrypt · Argon2id
KDF Chain Key Derivation HKDF · PBKDF2 · scrypt · Argon2id
Patron Shield Library Privacy IT-PIR · XOR Secret Sharing · Chor et al. 1995
Poly1305 MAC MAC Primitive Poly1305 · GF(2¹³⁰−5) · Key-Reuse Attack · Polynomial Stepper
Phantom Vault Stateless Passwords PBKDF2-SHA-256 · HMAC-DRBG · Rejection Sampling
Noise Pipe Noise Protocol Framework X25519 · HKDF · WireGuard · Handshake Patterns
Nonce Guard Nonce Misuse Resistance AES-GCM · AES-GCM-SIV · RFC 8452 · Synthetic IV
OT Gate Oblivious Transfer Simplest OT · Chou-Orlandi 2015 · X25519 · AES-256-GCM
Pairing Gate Pairing Cryptography BLS12-381 · BLS Signatures · Signature Aggregation · Rogue Key Attack
Bcrypt Forge Password Hashing bcrypt · Blowfish · Cost Factor · Timing-Safe Verification
OPAQUE Gate Password-Authenticated Key Exchange OPAQUE · OPRF · 3DH · AES-256-GCM
PKI Chain PKI & Certificates X.509 · Certificate Transparency · CA Compromise · ML-DSA
Frodo Vault Post-Quantum KEM FrodoKEM · LWE · Lattice · Post-Quantum
Kyber Vault Post-Quantum KEM ML-KEM · CRYSTALS-Kyber · Lattice · AES-256-GCM
McEliece Gate Post-Quantum KEM Classic McEliece · Goppa Codes · Post-Quantum
S-Cloud+ Vault Post-Quantum KEM S-Cloud+ · LWE KEM · BW32 Coding · Ternary Secrets
Isogeny Gate Post-Quantum Isogeny SIDH · CSIDH · SQIsign · Castryck-Decru
Lattice Fault Post-Quantum Side-Channel ML-KEM · ML-DSA · KyberSlash · Fault Injection
KyberSlash Post-Quantum Side-Channel ML-KEM · KyberSlash · Timing Attack · Barrett Reduction
HQC Timing Break Post-Quantum Side-Channel HQC · Cache Timing · Reed-Muller · Soft-ISD
LLL Break Post-Quantum Cryptanalysis LLL · BKZ · Gram-Schmidt · Toy LWE
MPCitH Sign Post-Quantum Signatures MPC-in-the-Head · Fiat-Shamir · SHA-256 Commitments · Merkle Proofs
HAWK Post-Quantum Signatures HAWK · Lattice Signatures · Gaussian Sampling · NIST Round 2
Hybrid Sign Post-Quantum Signatures Ed25519 · ML-DSA-65 · Composite Signatures · IETF LAMPS
Dilithium Reject Post-Quantum Signatures ML-DSA · Rejection Sampling · FIPS 204 · Timing Tradeoffs
PQ TLS Handshake Post-Quantum TLS TLS 1.3 · X25519MLKEM768 · Key Schedule · Hybrid PQC
PQ Rotation Post-Quantum Migration Hybrid X.509 · CNSA 2.0 · Key Rotation · Migration Planner
Harvest Timeline Post-Quantum Migration Mosca Inequality · CRQC Scenarios · Cost of Delay · PQC Migration
Grover Quantum Cryptanalysis Grover's Algorithm · Amplitude Amplification · Oracle Phase Kickback · AES Key Search
Shor Quantum Cryptanalysis Shor's Algorithm · Period Finding · QFT · Continued Fractions
BB84 Quantum Key Distribution Photon Polarization · Basis Sifting · QBER · Privacy Amplification
Protocol Compose Protocol Composition MAC-then-Encrypt · Encrypt-then-MAC · CRIME · TLS 1.3
Ring Sign Ring Signatures LSAG · Key Image · Group Signatures · Monero
Shamir Gate Secret Sharing Shamir SSS · Lagrange Interpolation · GF(p)
Garbled Gate Secure MPC Yao’s Garbled Circuits · Oblivious Transfer · Free XOR · Two-Party Computation
Silent Tally Secure MPC Shamir SSS · GF(2⁶¹−1) · Lagrange Interpolation · Additive Homomorphism
MAC Race Message Authentication HMAC · CMAC · Poly1305 · GHASH
Merkle Vault Merkle Trees SHA-256 · Merkle Tree · Inclusion Proofs · Certificate Transparency
Threshold Decrypt Threshold Decryption ElGamal · P-256 · NIZK Proofs · t-of-n
Threshold ML-DSA Threshold Signatures Threshold ML-DSA · Distributed Signing · k-of-n · Post-Quantum
FROST Threshold Threshold Signatures FROST (RFC 9591) · Ed25519 · Nonce Commitments · VSS Commitments
Timing Oracle Timing Side-Channel Timing Attack · HMAC · RSA · Cache-Timing
J-UNIWARD Steganography J-UNIWARD · DCT · Wavelet Distortion · Adaptive Embedding
Stego Suite Steganography LSB · DCT · Adaptive Embedding · Chi-Squared Steganalysis
ChaCha20 Stream Stream Cipher ChaCha20 · ARX · Nonce Reuse · Keystream
Curve448 High-Security Curves X448 · Ed448 · RFC 7748 · RFC 8032
ElGamal Plain Public-Key Encryption ElGamal · RFC 3526 Group 14 · Homomorphism · Re-randomization
RSA Forge Public-Key Cryptography RSA · OAEP · PSS · PKCS#1
VRF Gate Verifiable Randomness ECVRF P-256 · Wesolowski VDF · RANDAO · RFC 9381
VSS Gate Verifiable Secret Sharing Feldman VSS · Pedersen VSS · Commitment Verification · Cheating Detection
ZK Proof Lab Zero-Knowledge Proofs Schnorr · SHA-256 Commitments · Fiat-Shamir · zk-SNARK
STARK Tower Zero-Knowledge Proofs zk-STARK · AIR Constraints · FRI · Post-Quantum
SNARK Arena Zero-Knowledge Proofs Groth16 · PLONK · Trusted Setup · zk-SNARK
Bulletproofs Zero-Knowledge Range Proofs Bulletproofs · ristretto255 · Range Proofs · Inner-Product Argument
Merkle Vault Merkle Trees SHA-256 · Merkle Tree · Inclusion Proofs · Certificate Transparency
MAC Race Message Authentication HMAC · CMAC · Poly1305 · GHASH
Model Breach Threat Modeling & Cryptanalysis HiAE · Candidate Enumeration · MITM State Recovery · Guess-and-Determine
Noise Pipe Noise Protocol Framework X25519 · HKDF · WireGuard · Handshake Patterns
Nonce Guard Nonce Misuse Resistance AES-GCM · AES-GCM-SIV · RFC 8452 · Synthetic IV
OT Gate Oblivious Transfer Simplest OT · Chou-Orlandi 2015 · X25519 · AES-256-GCM
Pairing Gate Pairing Cryptography BLS12-381 · BLS Signatures · Signature Aggregation · Rogue Key Attack
Bcrypt Forge Password Hashing bcrypt · Blowfish · Cost Factor · Timing-Safe Verification
PKI Chain PKI & Certificates X.509 · Certificate Transparency · CA Compromise · ML-DSA
Frodo Vault Post-Quantum KEM FrodoKEM · LWE · Lattice · Post-Quantum
Kyber Vault Post-Quantum KEM ML-KEM · CRYSTALS-Kyber · Lattice · AES-256-GCM
McEliece Gate Post-Quantum KEM Classic McEliece · Goppa Codes · Post-Quantum
Dilithium Seal Post-Quantum Signatures ML-DSA · CRYSTALS-Dilithium · Lattice
Falcon Seal Post-Quantum Signatures Falcon · NTRU · FFT Sampling · Post-Quantum
Grover Quantum Cryptanalysis Grover's Algorithm · Amplitude Amplification · Oracle Phase Kickback · AES Key Search
Protocol Compose Protocol Composition MAC-then-Encrypt · Encrypt-then-MAC · CRIME · TLS 1.3
RSA Forge Public-Key Cryptography RSA · OAEP · PSS · PKCS#1
Ring Sign Ring Signatures LSAG · Key Image · Group Signatures · Monero
Shor Quantum Cryptanalysis Shor's Algorithm · Period Finding · QFT · Continued Fractions
Shamir Gate Secret Sharing Shamir SSS · Lagrange Interpolation · GF(p)
Garbled Gate Secure MPC Yao’s Garbled Circuits · Oblivious Transfer · Free XOR · Two-Party Computation
Silent Tally Secure MPC Shamir SSS · GF(2⁶¹−1) · Lagrange Interpolation · Additive Homomorphism
LMS Ledger Stateful Hash-Based Signatures LMS · HSS · W-OTS+ · NIST SP 800-208
Phantom Vault Stateless Passwords PBKDF2-SHA-256 · HMAC-DRBG · Rejection Sampling
J-UNIWARD Steganography J-UNIWARD · DCT · Wavelet Distortion · Adaptive Embedding
Stego Suite Steganography LSB · DCT · Adaptive Embedding · Chi-Squared Steganalysis
ChaCha20 Stream Stream Cipher ChaCha20 · ARX · Nonce Reuse · Keystream
Threshold Decrypt Threshold Decryption ElGamal · P-256 · NIZK Proofs · t-of-n
Threshold ML-DSA Threshold Signatures Threshold ML-DSA · Distributed Signing · k-of-n · Post-Quantum
Envelope KMS Envelope Encryption RFC 3394 · AES Key Wrap · DEK/KEK · Key Rotation
Bulletproofs Zero-Knowledge Range Proofs Bulletproofs · ristretto255 · Range Proofs · Inner-Product Argument
Nonce Lattice Lattice Attack ECDSA · Hidden Number Problem · LLL Reduction · secp256k1
Kerberos v5 Authentication Protocol RFC 4120 · Needham-Schroeder · Lowe Attack · AES-256-CTS
MLS Group Group Messaging Security MLS (RFC 9420) · TreeKEM · Epoch Key Schedule · Forward Secrecy
GG20 Wallet Threshold ECDSA GG20 · Paillier · secp256k1 · Distributed Key Generation
FROST Threshold Threshold Signatures FROST (RFC 9591) · Ed25519 · Nonce Commitments · VSS Commitments
Timing Oracle Timing Side-Channel Timing Attack · HMAC · RSA · Cache-Timing
Isogeny Gate Post-Quantum Isogeny SIDH · CSIDH · SQIsign · Castryck-Decru
Lattice Fault Post-Quantum Side-Channel ML-KEM · ML-DSA · KyberSlash · Fault Injection
LLL Break Post-Quantum Cryptanalysis LLL · BKZ · Gram-Schmidt · Toy LWE
KyberSlash Post-Quantum Side-Channel ML-KEM · KyberSlash · Timing Attack · Barrett Reduction
HQC Timing Break Post-Quantum Side-Channel HQC · Cache Timing · Reed-Muller · Soft-ISD
MPCitH Sign Post-Quantum Signatures MPC-in-the-Head · Fiat-Shamir · SHA-256 Commitments · Merkle Proofs
HAWK Post-Quantum Signatures HAWK · Lattice Signatures · Gaussian Sampling · NIST Round 2
Hybrid Sign Post-Quantum Signatures Ed25519 · ML-DSA-65 · Composite Signatures · IETF LAMPS
Dilithium Reject Post-Quantum Signatures ML-DSA · Rejection Sampling · FIPS 204 · Timing Tradeoffs
OPAQUE Gate Password-Authenticated Key Exchange OPAQUE · OPRF · 3DH · AES-256-GCM
PQ TLS Handshake Post-Quantum TLS TLS 1.3 · X25519MLKEM768 · Key Schedule · Hybrid PQC
PQ Rotation Post-Quantum Migration Hybrid X.509 · CNSA 2.0 · Key Rotation · Migration Planner
Harvest Timeline Post-Quantum Migration Mosca Inequality · CRQC Scenarios · Cost of Delay · PQC Migration
VRF Gate Verifiable Randomness ECVRF P-256 · Wesolowski VDF · RANDAO · RFC 9381
VSS Gate Verifiable Secret Sharing Feldman VSS · Pedersen VSS · Commitment Verification · Cheating Detection
Curve448 High-Security Curves X448 · Ed448 · RFC 7748 · RFC 8032
ECDSA Forge Digital Signatures ECDSA · secp256k1 · RFC 6979 · Nonce Reuse
ElGamal Plain Public-Key Encryption ElGamal · RFC 3526 Group 14 · Homomorphism · Re-randomization
AEGIS Gate Authenticated Encryption AEGIS-256 · AES Round Function · 6-State Sponge · Test Vectors
Ascon Lightweight Cryptography Ascon-AEAD128 · Ascon-Hash256 · Lightweight Crypto · IoT
IBE Gate Identity-Based Encryption Boneh-Franklin · BLS12-381 · Identity-Based Encryption · Key Escrow
NTRU Classic Lattice Cryptography NTRU · Polynomial Rings · Lattice · EESS#1
Paillier Gate Additive Homomorphic Encryption Paillier · Additive HE · Private Voting · Aggregation
ORAM Vault Access-Pattern Privacy Path ORAM · Position Map · Stash · Access Patterns
PSI Gate Private Set Intersection DH-PSI · ristretto255 · Hash-to-Curve · Contact Discovery
LMS/XMSS Hash-Based Signatures LMS · XMSS · HSS · NIST SP 800-208
S-Cloud+ Vault Post-Quantum KEM S-Cloud+ · LWE KEM · BW32 Coding · Ternary Secrets
SNARK Arena Zero-Knowledge Proofs Groth16 · PLONK · Trusted Setup · zk-SNARK
STARK Tower Zero-Knowledge Proofs zk-STARK · AIR Constraints · FRI · Post-Quantum
ZK Proof Lab Zero-Knowledge Proofs Schnorr · SHA-256 Commitments · Fiat-Shamir · zk-SNARK

Related Projects

These sit outside the browser-demo scope of Crypto Lab but belong to the same collection:

  • Crypto Compare — Algorithm reference covering NIST and PQ-Safe standards.
  • Cipher Museum — An interactive museum spanning 3,900 years of cryptographic history. Thirteen halls, 140 exhibits, live encryption demos, and cryptanalysis labs.
  • Meow Decoder — Secure optical air-gap file transfer via QR-code GIFs. AES-256-GCM + Argon2id + ML-KEM-1024 + fountain codes. Python + Rust.

About

Each demo is self-contained: one concept, one repository, full source. Documentation and threat models are included where the attack surface warrants it.

Built by Paul Clark — IT Librarian & Systems Analyst.


So whether you eat or drink or whatever you do, do it all for the glory of God. — 1 Corinthians 10:31

Releases

No releases published

Packages

 
 
 

Contributors

Languages

Morty Proxy This is a proxified and sanitized view of the page, visit original site.