The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
Abstract: Data protection via encryption continues to be a key concern in the constantly changing field of digital security. This study investigates a novel method of pixel displacement picture ...
Abstract: In everyday life, it is crucial to protect our data and communication. The necessity for secure message communication is not a novel concept. It has existed for a long time. Data security ...
BAR (Burn After Reading) is my project to showcase skills in security, cryptography, and logic design. It’s an offline desktop app for sensitive file management with encryption and self-destruction ...
Authenticated PNG image encryption tool using PBKDF2 key derivation and HMAC-SHA256 integrity verification to prevent wrong-password corruption. A unified Python desktop application for file ...