Closed dapinkone closed 10 months ago
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf [SHA-3 Derived functions cSHAKE, KMAC, TupleHash, ParallelHash] https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf [SHA-3 Standard]
[x] Keccak
[x] cSHAKE256 and KMACXOF256
Specific requirements from rubric:
[x] command-line application/interface, using the String[] args argument to the main() in Main.java
the String[] args argument to the main() in Main.java
[x] compute plain cryptographic hash of a given file(or text input by user)
[x] compute authentication tag (MAC) of a given file(or user-given input) under a given passphrase
[x] encrypt a given data file symmetrically under a given passphrase
[x] decrypt a given symmetric cryptogram under a given passphrase
[x] Instructions / documentation for use of the application should be typeset and provided in project report PDF
substring not required as per prof
part 1 requirements complete.
Part 1
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-185.pdf [SHA-3 Derived functions cSHAKE, KMAC, TupleHash, ParallelHash] https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf [SHA-3 Standard]
[x] Keccak
substring[x] cSHAKE256 and KMACXOF256
[x] #2
Specific requirements from rubric:
[x] command-line application/interface, using
the String[] args argument to the main() in Main.java
[x] compute plain cryptographic hash of a given file(or text input by user)
[x] compute authentication tag (MAC) of a given file(or user-given input) under a given passphrase
[x] encrypt a given data file symmetrically under a given passphrase
[x] decrypt a given symmetric cryptogram under a given passphrase
[x] Instructions / documentation for use of the application should be typeset and provided in project report PDF