Browser-based cryptography demos — no backends, no accounts, just the math.
A curated cryptography lab — from fundamentals to cutting-edge research
A curated collection of single-concept cryptography demonstrations. Each one isolates a real primitive or protocol and makes it interactive in the browser. Classic algorithms, post-quantum schemes, zero-knowledge proofs — all grounded in real specifications, not toy reimplementations.
Live → https://systemslibrarian.github.io/crypto-lab/
| Project | Concept | Primitives |
|---|---|---|
| Snow 2 | Stream Cipher | XChaCha20-Poly1305 · Argon2id · HKDF-SHA-256 · Steganography |
| Quantum Vault KpqC | Post-Quantum | AES-256-GCM · Shamir SSS · SMAUG-T · HAETAE |
| Project | Category | Stack |
|---|---|---|
| Iron Letter | Asymmetric Encryption | ECIES P-256 · RSA-OAEP · AES-256-GCM |
| X3DH Wire | Asynchronous Key Agreement | X3DH · X25519 · HKDF-SHA-256 · Signal Protocol |
| Corrupted Oracle | Backdoored RNG | Dual_EC_DRBG · HMAC-DRBG · ChaCha20-DRBG · P-256 |
| Blind Sign | Blind Signatures | Chaum RSA · Schnorr EC · e-Cash · Unlinkability |
| Iron Serpent | Block Cipher | Serpent · AES-256 · SPN |
| World Ciphers | Block Cipher | Camellia · ARIA · SM4 · Kuznyechik |
| AES Modes | Block Cipher Modes | AES · AES-GCM · AES-CBC · Authenticated Encryption |
| Padding Oracle | CBC Padding Oracle | AES-CBC · PKCS#7 · Vaudenay 2002 · POODLE |
| BIKE Vault | Code-Based KEM | BIKE · QC-MDPC · Post-Quantum · KEM |
| HQC Vault | Code-Based KEM | HQC · Reed-Muller · Reed-Solomon · Post-Quantum |
| Commit Gate | Commitment Schemes | Hash Commitment · Pedersen · Binding & Hiding · Homomorphic Addition |
| DRBG Arena | CSPRNG | HMAC_DRBG · CTR_DRBG · Hash_DRBG · NIST SP 800-90A |
| BB84 | Quantum Key Distribution | Photon Polarization · Basis Sifting · QBER · Privacy Amplification |
| Shadow Vault | Deniable Encryption | Argon2id · ChaCha20-Poly1305 · SHA-256 |
| Biham Lens | Differential Cryptanalysis | Differential Cryptanalysis · SPN · DDT · Chosen-Plaintext |
| Ed25519 Forge | Digital Signatures | Ed25519 · Deterministic Nonces · ZIP215 · Cofactor |
| Curve Lens | Elliptic Curves | ECC · Curve25519 · ECDH · P-256 |
| Dad Mode Morse | Encrypted Morse | AES-256-GCM · Argon2id · HKDF-SHA-256 · Ed25519 |
| Format Ward | Format-Preserving Encryption | FF1 · FF3-1 · AES-256 · Tokenization |
| Ratchet Wire | Forward-Secret Messaging | Double Ratchet · X25519 · HKDF · AES-256-GCM |
| Babel Hash | Hash Functions | SHA-256 · SHA3-256 · BLAKE3 · HMAC |
| World Hashes | Hash Functions | SM3 · Streebog · Kupyna · SHA-256 · SHA-3 |
| Hash Zoo | Hash Internals | SHA-256 · SHA3-256 · BLAKE3 · Merkle-Damgård · Sponge |
| SPHINCS+ Ledger | Hash-Based Signatures | SLH-DSA · SPHINCS+ · SHA-256 · FORS |
| Dead Sea Cipher | Historical Cipher | Substitution · Transposition · Atbash |
| Blind Oracle | Homomorphic Encryption | TFHE-rs |
| CKKS Lab | Homomorphic Encryption | CKKS · RLWE · Approximate FHE · Encrypted Inference |
| FHE Arena | Homomorphic Encryption | BGV/BFV · RLWE · Noise Budget · SIMD Batching |
| Hybrid Wire | Hybrid Key Exchange | X25519 · ML-KEM-768 · HKDF-SHA256 · AES-256-GCM |
| Harvest Vault | Quantum Threat | HNDL · Mosca's Theorem · Q-Day Timeline · PQC Migration |
| Oblivious Shelf | IT-PIR Library Privacy | XOR PIR · Chor et al. 1995 · 2-Server PIR · Privacy Audit |
| KDF Arena | KDF Benchmarks | HKDF · PBKDF2 · scrypt · Argon2id |
| KDF Chain | Key Derivation | HKDF · PBKDF2 · scrypt · Argon2id |
| Patron Shield | Library Privacy | IT-PIR · XOR Secret Sharing · Chor et al. 1995 |
| Poly1305 MAC | MAC Primitive | Poly1305 · GF(2¹³⁰−5) · Key-Reuse Attack · Polynomial Stepper |
| Merkle Vault | Merkle Trees | SHA-256 · Merkle Tree · Inclusion Proofs · Certificate Transparency |
| MAC Race | Message Authentication | HMAC · CMAC · Poly1305 · GHASH |
| Model Breach | Threat Modeling & Cryptanalysis | HiAE · Candidate Enumeration · MITM State Recovery · Guess-and-Determine |
| Noise Pipe | Noise Protocol Framework | X25519 · HKDF · WireGuard · Handshake Patterns |
| Nonce Guard | Nonce Misuse Resistance | AES-GCM · AES-GCM-SIV · RFC 8452 · Synthetic IV |
| OT Gate | Oblivious Transfer | Simplest OT · Chou-Orlandi 2015 · X25519 · AES-256-GCM |
| Pairing Gate | Pairing Cryptography | BLS12-381 · BLS Signatures · Signature Aggregation · Rogue Key Attack |
| Bcrypt Forge | Password Hashing | bcrypt · Blowfish · Cost Factor · Timing-Safe Verification |
| PKI Chain | PKI & Certificates | X.509 · Certificate Transparency · CA Compromise · ML-DSA |
| Frodo Vault | Post-Quantum KEM | FrodoKEM · LWE · Lattice · Post-Quantum |
| Kyber Vault | Post-Quantum KEM | ML-KEM · CRYSTALS-Kyber · Lattice · AES-256-GCM |
| McEliece Gate | Post-Quantum KEM | Classic McEliece · Goppa Codes · Post-Quantum |
| Dilithium Seal | Post-Quantum Signatures | ML-DSA · CRYSTALS-Dilithium · Lattice |
| Falcon Seal | Post-Quantum Signatures | Falcon · NTRU · FFT Sampling · Post-Quantum |
| Grover | Quantum Cryptanalysis | Grover's Algorithm · Amplitude Amplification · Oracle Phase Kickback · AES Key Search |
| Protocol Compose | Protocol Composition | MAC-then-Encrypt · Encrypt-then-MAC · CRIME · TLS 1.3 |
| RSA Forge | Public-Key Cryptography | RSA · OAEP · PSS · PKCS#1 |
| Ring Sign | Ring Signatures | LSAG · Key Image · Group Signatures · Monero |
| Shor | Quantum Cryptanalysis | Shor's Algorithm · Period Finding · QFT · Continued Fractions |
| Shamir Gate | Secret Sharing | Shamir SSS · Lagrange Interpolation · GF(p) |
| Garbled Gate | Secure MPC | Yao’s Garbled Circuits · Oblivious Transfer · Free XOR · Two-Party Computation |
| Silent Tally | Secure MPC | Shamir SSS · GF(2⁶¹−1) · Lagrange Interpolation · Additive Homomorphism |
| LMS Ledger | Stateful Hash-Based Signatures | LMS · HSS · W-OTS+ · NIST SP 800-208 |
| Phantom Vault | Stateless Passwords | PBKDF2-SHA-256 · HMAC-DRBG · Rejection Sampling |
| J-UNIWARD | Steganography | J-UNIWARD · DCT · Wavelet Distortion · Adaptive Embedding |
| Stego Suite | Steganography | LSB · DCT · Adaptive Embedding · Chi-Squared Steganalysis |
| ChaCha20 Stream | Stream Cipher | ChaCha20 · ARX · Nonce Reuse · Keystream |
| Threshold Decrypt | Threshold Decryption | ElGamal · P-256 · NIZK Proofs · t-of-n |
| Threshold ML-DSA | Threshold Signatures | Threshold ML-DSA · Distributed Signing · k-of-n · Post-Quantum |
| GG20 Wallet | Threshold ECDSA | GG20 · Paillier · secp256k1 · Distributed Key Generation |
| FROST Threshold | Threshold Signatures | FROST (RFC 9591) · Ed25519 · Nonce Commitments · VSS Commitments |
| Timing Oracle | Timing Side-Channel | Timing Attack · HMAC · RSA · Cache-Timing |
| Isogeny Gate | Post-Quantum Isogeny | SIDH · CSIDH · SQIsign · Castryck-Decru |
| Lattice Fault | Post-Quantum Side-Channel | ML-KEM · ML-DSA · KyberSlash · Fault Injection |
| LLL Break | Post-Quantum Cryptanalysis | LLL · BKZ · Gram-Schmidt · Toy LWE |
| KyberSlash | Post-Quantum Side-Channel | ML-KEM · KyberSlash · Timing Attack · Barrett Reduction |
| HQC Timing Break | Post-Quantum Side-Channel | HQC · Cache Timing · Reed-Muller · Soft-ISD |
| MPCitH Sign | Post-Quantum Signatures | MPC-in-the-Head · Fiat-Shamir · SHA-256 Commitments · Merkle Proofs |
| HAWK | Post-Quantum Signatures | HAWK · Lattice Signatures · Gaussian Sampling · NIST Round 2 |
| Hybrid Sign | Post-Quantum Signatures | Ed25519 · ML-DSA-65 · Composite Signatures · IETF LAMPS |
| Dilithium Reject | Post-Quantum Signatures | ML-DSA · Rejection Sampling · FIPS 204 · Timing Tradeoffs |
| OPAQUE Gate | Password-Authenticated Key Exchange | OPAQUE · OPRF · 3DH · AES-256-GCM |
| PQ TLS Handshake | Post-Quantum TLS | TLS 1.3 · X25519MLKEM768 · Key Schedule · Hybrid PQC |
| PQ Rotation | Post-Quantum Migration | Hybrid X.509 · CNSA 2.0 · Key Rotation · Migration Planner |
| Harvest Timeline | Post-Quantum Migration | Mosca Inequality · CRQC Scenarios · Cost of Delay · PQC Migration |
| VRF Gate | Verifiable Randomness | ECVRF P-256 · Wesolowski VDF · RANDAO · RFC 9381 |
| VSS Gate | Verifiable Secret Sharing | Feldman VSS · Pedersen VSS · Commitment Verification · Cheating Detection |
| Curve448 | High-Security Curves | X448 · Ed448 · RFC 7748 · RFC 8032 |
| ECDSA Forge | Digital Signatures | ECDSA · secp256k1 · RFC 6979 · Nonce Reuse |
| ElGamal Plain | Public-Key Encryption | ElGamal · RFC 3526 Group 14 · Homomorphism · Re-randomization |
| AEGIS Gate | Authenticated Encryption | AEGIS-256 · AES Round Function · 6-State Sponge · Test Vectors |
| Ascon | Lightweight Cryptography | Ascon-AEAD128 · Ascon-Hash256 · Lightweight Crypto · IoT |
| IBE Gate | Identity-Based Encryption | Boneh-Franklin · BLS12-381 · Identity-Based Encryption · Key Escrow |
| NTRU Classic | Lattice Cryptography | NTRU · Polynomial Rings · Lattice · EESS#1 |
| Paillier Gate | Additive Homomorphic Encryption | Paillier · Additive HE · Private Voting · Aggregation |
| ORAM Vault | Access-Pattern Privacy | Path ORAM · Position Map · Stash · Access Patterns |
| PSI Gate | Private Set Intersection | DH-PSI · ristretto255 · Hash-to-Curve · Contact Discovery |
| LMS/XMSS | Hash-Based Signatures | LMS · XMSS · HSS · NIST SP 800-208 |
| S-Cloud+ Vault | Post-Quantum KEM | S-Cloud+ · LWE KEM · BW32 Coding · Ternary Secrets |
| SNARK Arena | Zero-Knowledge Proofs | Groth16 · PLONK · Trusted Setup · zk-SNARK |
| STARK Tower | Zero-Knowledge Proofs | zk-STARK · AIR Constraints · FRI · Post-Quantum |
| ZK Proof Lab | Zero-Knowledge Proofs | Schnorr · SHA-256 Commitments · Fiat-Shamir · zk-SNARK |
These sit outside the browser-demo scope of Crypto Lab but belong to the same collection:
- Crypto Compare — Algorithm reference covering NIST and PQ-Safe standards.
- Cipher Museum — An interactive museum spanning 2,500 years of cryptographic history. Ten halls, 37 ciphers, live encryption demos, and cryptanalysis labs.
- Meow Decoder — Secure optical air-gap file transfer via QR-code GIFs. AES-256-GCM + Argon2id + ML-KEM-1024 + fountain codes. Python + Rust.
Each demo is self-contained: one concept, one repository, full source. Documentation and threat models are included where the attack surface warrants it.
Built by Paul Clark — IT Librarian & Systems Analyst.
So whether you eat or drink or whatever you do, do it all for the glory of God. — 1 Corinthians 10:31