Created by Soumit Santra β Educational Cryptography & Cryptanalysis Tool
Β© 2026 [Soumit Santra]. All rights reserved.
THIS TOOL IS STRICTLY FOR EDUCATIONAL AND AUTHORIZED RESEARCH ONLY!
- DO NOT USE for illegal activities, unauthorized access, or malicious purposes
- OBTAIN EXPLICIT PERMISSION before testing on any systems you don't own
- CRYPTANALYSIS TOOLS are for learning purposes and authorized security research only
- THE AUTHOR IS NOT RESPONSIBLE for misuse, damages, or illegal activities
- SOME TECHNIQUES may be illegal in your jurisdiction - check local laws
Ethical Use Only:
- Educational learning and understanding cryptographic concepts
- Authorized security research and penetration testing
- Academic coursework and research projects
- Personal skill development in controlled environments
- Never use against systems without explicit written permission
This tool is designed to help students, researchers, and security professionals understand:
- Classical cipher mechanisms and their vulnerabilities
- Modern cryptographic implementations
- Cryptanalysis techniques and their limitations
- Security analysis methodologies
- The evolution from classical to modern cryptography
- Caesar Cipher - Enhanced with extended character set
- Vigenère Cipher - Polyalphabetic substitution
- Playfair Cipher - Digraph substitution cipher
- Rail Fence Cipher - Zigzag transposition
- Atbash Cipher - Alphabet reversal
- ROT13 - Simple letter rotation
- Base64 encoding and decoding
- Hexadecimal conversion
- Binary representation
- Morse Code translation
- Fernet symmetric encryption (AES-based)
- RSA asymmetric encryption
- Elliptic Curve Cryptography (ECC)
- Digital Signatures (RSA/ECDSA)
- HMAC (Message Authentication Code)
- Password-based Encryption (PBKDF2)
- Frequency Analysis with visualization
- Language Detection using statistical methods
- Chi-squared Analysis for cipher identification
- Entropy Analysis for randomness testing
- N-gram Analysis for pattern recognition
- Index of Coincidence calculations
- Caesar Brute Force with language scoring
- Vigenère Key Length estimation
- Kasiski Examination for repeated sequences
- Statistical Cipher Identification
- Markov Chain Analysis
- Image Steganography (LSB method)
- Text Steganography (whitespace encoding)
- Audio and file format steganography (scaffolds)
- Hash Functions (MD5, SHA family)
- Key Generation utilities
- Secure Key Storage in memory
- Quantum-resistant algorithm scaffolds
- Timing Attack simulation
- Python 3.7+
- pip (Python package manager)
pycryptodome
cryptography
requests
colorama
tqdm
Pillow
| Package | Version | Purpose |
|---|---|---|
pycryptodome |
β₯ 3.20.0 | AES, RSA, PKCS1_OAEP ciphers |
cryptography |
β₯ 42.0.0 | Fernet, PBKDF2, ECC, ECDSA |
requests |
β₯ 2.31.0 | PyPI version checking at startup |
colorama |
β₯ 0.4.6 | Colored terminal output |
tqdm |
β₯ 4.66.0 | Progress bars |
Pillow |
β₯ 10.0.0 | Image steganography (PIL) |
Note: The script also auto-installs and auto-updates all dependencies on first run β no manual setup needed if you prefer that.
Just run the script β it will automatically detect, install, and update all required packages:
python crypto_tool.py# 1. Clone the repository
git clone https://github.com/Soumit-Santra/Cryptography-Tool
cd Cryptography-Tool
# 2. (Optional) Create a virtual environment
python -m venv venv
# Activate on Windows:
venv\Scripts\activate
# Activate on macOS/Linux:
source venv/bin/activate
# 3. Install all dependencies at once
pip install -r requirements.txt
# 4. Run the tool
python crypto_tool.pyTo update all packages to their latest versions:
pip install -r requirements.txt --upgradepython crypto_tool.pyDependencies install automatically on first run.
python3 crypto_tool.pyIf you encounter permission issues:
pip install -r requirements.txt --userRun the script and choose from 44+ different cryptographic operations:
CLASSIC CIPHERS:
1. Caesar Cipher (Enhanced)
2. Vigenère Cipher
3. Playfair Cipher
[...]
MODERN ENCRYPTION:
19. Fernet (Encrypt/Decrypt)
20. RSA (Encrypt/Decrypt)
[...]
ANALYSIS TOOLS:
12. Frequency Analysis
13. Language Detection
[...]
Encrypt with Caesar Cipher:
Choose option: 1
Encrypt or Decrypt? (e/d): e
Enter text: Hello World
Enter shift value: 3
Encrypted: Khoor Zruog
Frequency Analysis:
Choose option: 12
Enter text for frequency analysis: HELLO WORLD
[Displays frequency histogram]
RSA Key Generation:
Choose option: 21
Enter key size (default 2048): 2048
[Generates and displays RSA key pair]
Learn how classical ciphers can be broken:
- Use frequency analysis to identify substitution patterns
- Apply statistical methods to determine cipher types
- Understand the importance of key length in security
Explore secure implementations:
- Generate proper cryptographic keys
- Understand the difference between symmetric and asymmetric encryption
- Learn about digital signatures and authentication
Educational cryptanalysis methods:
- Kasiski examination for Vigenère ciphers
- Statistical analysis for cipher identification
- Entropy testing for randomness assessment
This tool helps users understand:
- Historical Cryptography - Why classical ciphers are vulnerable
- Modern Security - How current systems protect data
- Cryptanalysis - Methods for analyzing unknown ciphers
- Implementation - Proper use of cryptographic libraries
- Security Principles - Best practices in cryptographic design
- β Educational learning and coursework
- β Authorized security research
- β Academic research projects
- β Personal skill development
- β Penetration testing with written permission
- β Unauthorized system access
- β Breaking encryption without permission
- β Illegal surveillance or espionage
- β Academic dishonesty or cheating
- β Any malicious or harmful activities
- Keys are stored in memory only during execution
- No persistent key storage by default
- Educational implementations may not be production-ready
- Some algorithms are deprecated (MD5, etc.) - included for learning only
- Use production libraries for real applications
If you discover vulnerabilities in the educational implementations:
- Do not exploit them maliciously
- Document the issue responsibly
- Use findings for educational purposes only
- Consider contributing improvements
Contributions welcome for:
- Educational improvements
- Additional cipher implementations
- Better documentation
- Security enhancements
- Bug fixes
Please ensure all contributions maintain the educational focus and ethical guidelines.
Recommended Resources:
- "Applied Cryptography" by Bruce Schneier
- "Cryptography Engineering" by Ferguson, Schneier, and Kohno
- "The Code Book" by Simon Singh
- NIST Cryptographic Standards
- Academic cryptography courses
This tool contains powerful cryptanalysis capabilities. Use them responsibly:
- Never attempt to break encryption without explicit authorization
- Respect privacy and legal boundaries
- Use knowledge gained for constructive purposes
- Remember that unauthorized access is illegal in most jurisdictions
- When in doubt, don't use the tool
The power to understand cryptography comes with the responsibility to use that knowledge ethically.
This educational tool is provided for learning purposes. Users are responsible for ensuring their use complies with applicable laws and ethical standards.
"Knowledge is power, but with power comes responsibility. Use cryptographic knowledge to protect, not to harm."