
Product
A New Design for GitHub PR Comments
We redesigned our GitHub PR comments to deliver clear, actionable security insights without adding noise to your workflow.
github.com/b2camp/go-cryptography
This repository contains examples demonstrating various cryptographic algorithms implemented in Go. The examples cover encryption, decryption, hashing, and digital signature operations using standard libraries and techniques.
Cryptography is the practice of securing communication and data through encoding techniques. This repository showcases various cryptographic algorithms and their practical use cases in Go, such as encryption, hashing, and signing.
To run these examples, you need:
AES (Advanced Encryption Standard) is a fast and secure symmetric encryption algorithm.
Example: aes.go
go run aes.go
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem for secure data transmission.
Example: rsa.go
go run rsa.go
ECC provides efficient cryptography with smaller keys. It's widely used in blockchain and secure communications.
Example: ecc.go
go run ecc.go
Generate a SHA-256 hash for message integrity verification.
Example: sha256.go
go run sha256.go
HMAC (Hash-Based Message Authentication Code) provides message authentication using a shared secret key.
Example: hmac.go
go run hmac.go
Base64 encoding is used to safely transmit binary data as text.
Example: base64.go
go run base64.go
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
We redesigned our GitHub PR comments to deliver clear, actionable security insights without adding noise to your workflow.
Product
Our redesigned Repositories page adds alert severity, filtering, and tabs for faster triage and clearer insights across all your projects.
Security News
Slopsquatting is a new supply chain threat where AI-assisted code generators recommend hallucinated packages that attackers register and weaponize.