• Stars
    star
    1
  • Language
    C
  • Created almost 9 years ago
  • Updated almost 9 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Used Gcrypt library in c and implemented HMAC SHA1, HMAC SHA 256, HMAC MD5, AES 256, AES 128, RSA 1024, RSA 4096 and Digital Signature.

More Repositories

1

DNS-Attacks

simulated and performed various dns attacks such as host file attack, host-level response spoofing, server-level response spoofing and kaminsky attack. Used C code to perform Kaminsky attack by modifying pacgen.c file.
C
3
star
2

Nanex-Data-Exploration-Using-Grokit

• Used state of the art supercomputer to explore Nanex data (using R) • Cleaned raw Sec Filings (using regular expressions-python) • Computed moving average and abnormal return (2-3 billion tuples)
R
1
star
3

Facebook-REST-API

Secure Facebook REST API and simulator implementation. Implemented core features of Facebook API (using spray can, Scala, Akka actors) . Added state-of-the-art cryptographic methods AES-256, RSA and others to make secure. Developed client simulator based on Facebook user behavioral studies.
Scala
1
star
4

Parsing-Sec-Filings

Used python to extract a table from Sec filings raw data.
Python
1
star
5

Red-Black-Tree-Event-Counter

I implemented an event counter using red-black tree. Each event has two fields: id and count, where count is the number of active events with the given id. The event counter stores only those id’s whose count is > 0. Once a count drops below 1, that ID is removed. My program initailly builds a red-black tree from a sorted list of n events(in ascending order of id) in O(n) time. My program takes a list of commands from standard input stream and gives the appropriate output. I ran the program on all the 4 test files and got the correct result each time.
Java
1
star
6

Gossip-Simulator

Distributed operating system project using Scala and Akka actor framework. Simulate a sensor type network using gossip and push sum algorithms. Tested various topologies and implemented failure models.
XSLT
1
star