
Security News
npm Adopts OIDC for Trusted Publishing in CI/CD Workflows
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Secrypto is an excellent cryptographer, with more than $4.5e806$ (45 with 805 following zeros!) possible combinations.
from Secrypto import Key
key = Key()
Key
can have the following parameters:
alterations
(optional) (default -> 3) - This defines the number of alterations for each character.seed
(optional) (default -> None) - This defines the random seed at which the key will be madeYou can also get the seed
at which the Key is made and the key
itself.
To get the key
and the seed
from the Key
you can write:
from Secrypto import Key
key = Key()
print(key.key)
print(key.seed)
When you have the key, it is pretty simple to encrypt and decrypt.
from Secrypto import Key, encrypt, decrypt
key = Key()
text = "Hello, World"
encryption = encrypt(
text,
key
)
print(encryption)
decryption = decrypt(
encryption,
key #the same key should be used.
)
print(decryption)
if text == decryption:
print("success!")
Secrypto is licensed under the CC0 1.0 Universal License.
Follow the CONTRIBUTING.md to ensure a smooth contribution process.
Secrypto has the Contributor Covenant Code of Conduct.
To view the security and data safety of Secrypto, see SECURITY.md
.
FAQs
A powerful encryption and decryption library
We found that secrypto demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.