|
1 | | -# code |
| 1 | +🔐 Code |
| 2 | + |
| 3 | +[](#) |
| 4 | +[](#) |
| 5 | +[](#) |
| 6 | + |
| 7 | +**Classical cipher cryptanalysis toolkit** — Break historical ciphers with statistical attacks. |
| 8 | + |
| 9 | + |
| 10 | + |
| 11 | +## 🚀 Features |
| 12 | + |
| 13 | +- **Vigenère Cipher** — Kasiski examination, index of coincidence |
| 14 | +- **Beaufort Cipher** — Reciprocal cipher analysis |
| 15 | +- **Caesar Cipher** — Frequency analysis, brute force |
| 16 | +- **XOR Cipher** — Known plaintext, crib dragging |
| 17 | +- **Base64** — Encoding/decoding utilities |
| 18 | +- **Dictionary Validation** — Verify plaintext against word lists |
| 19 | +- **Web Workers** — Background processing for large texts |
| 20 | + |
| 21 | +## 🛠️ Tech Stack |
| 22 | + |
| 23 | +- Pure HTML/CSS/JavaScript |
| 24 | +- Web Workers for parallel computation |
| 25 | +- Frequency analysis algorithms |
| 26 | +- No external dependencies |
| 27 | + |
| 28 | +## 📖 Usage |
| 29 | + |
| 30 | +1. Open \`index.html\` in your browser |
| 31 | +2. Paste your ciphertext |
| 32 | +3. Select the suspected cipher type |
| 33 | +4. Click **Analyze** to run attacks |
| 34 | +5. Review candidate plaintexts |
| 35 | + |
| 36 | +## 🎓 Techniques Implemented |
| 37 | + |
| 38 | +- **Frequency Analysis** — Letter distribution comparison |
| 39 | +- **Index of Coincidence** — Key length estimation |
| 40 | +- **Kasiski Examination** — Repeated sequence analysis |
| 41 | +- **Dictionary Attack** — Plaintext validation |
| 42 | +- **Chi-squared Test** — Statistical fitness |
| 43 | + |
| 44 | +## 📄 License |
| 45 | + |
| 46 | +MIT |
| 47 | + |
| 48 | +## 👤 Author |
| 49 | + |
| 50 | +**Eric PERRET** — [GitHub](https://github.com/ericperret) |
0 commit comments