Skip to content

Commit b03ca82

Browse files
committed
📄 Update README.md
1 parent fe1bca6 commit b03ca82

1 file changed

Lines changed: 50 additions & 1 deletion

File tree

README.md

Lines changed: 50 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,50 @@
1-
# code
1+
🔐 Code
2+
3+
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](#)
4+
[![Pure HTML/JS](https://img.shields.io/badge/Pure-HTML%2FJS-blue.svg)](#)
5+
[![Cryptography](https://img.shields.io/badge/Domain-Cryptography-red.svg)](#)
6+
7+
**Classical cipher cryptanalysis toolkit** — Break historical ciphers with statistical attacks.
8+
9+
![Screenshot](screenshot.png)
10+
11+
## 🚀 Features
12+
13+
- **Vigenère Cipher** — Kasiski examination, index of coincidence
14+
- **Beaufort Cipher** — Reciprocal cipher analysis
15+
- **Caesar Cipher** — Frequency analysis, brute force
16+
- **XOR Cipher** — Known plaintext, crib dragging
17+
- **Base64** — Encoding/decoding utilities
18+
- **Dictionary Validation** — Verify plaintext against word lists
19+
- **Web Workers** — Background processing for large texts
20+
21+
## 🛠️ Tech Stack
22+
23+
- Pure HTML/CSS/JavaScript
24+
- Web Workers for parallel computation
25+
- Frequency analysis algorithms
26+
- No external dependencies
27+
28+
## 📖 Usage
29+
30+
1. Open \`index.html\` in your browser
31+
2. Paste your ciphertext
32+
3. Select the suspected cipher type
33+
4. Click **Analyze** to run attacks
34+
5. Review candidate plaintexts
35+
36+
## 🎓 Techniques Implemented
37+
38+
- **Frequency Analysis** — Letter distribution comparison
39+
- **Index of Coincidence** — Key length estimation
40+
- **Kasiski Examination** — Repeated sequence analysis
41+
- **Dictionary Attack** — Plaintext validation
42+
- **Chi-squared Test** — Statistical fitness
43+
44+
## 📄 License
45+
46+
MIT
47+
48+
## 👤 Author
49+
50+
**Eric PERRET**[GitHub](https://github.com/ericperret)

0 commit comments

Comments
 (0)