Generate simple encrypted messages!

Overview

Premio's Shift is a very simple text encryption, you can use it to send secret messages to your friends.

Table of Content

How it works

  • A Shift is a message encrypted using Premio's Shift.
  • Every Shift has a key to encrypt and decrypt
  • The key has no char limit
  • A key only has alphabetic characters and numbers, everything else is ignored
  • Messages have a position, being 0 the initial state

Lets look at this example using the message "ahz159" and key "2ca".

Position Message
0 ahz159
1 cja380
25 ydy104
  1. First, the key is converted to a list of key numbers, in this case: [2, 3, 1]
    • 2 is a number, so we keep it;
    • "c" is a letter, so we get it's position in the alphabet, in this case: 3
    • "a" is a letter, so we get it's position in the alphabet, in this case: 1
  2. Now multiply the list by the amount if shift we want in the message
    • If the shift is 25, we multiply all the numbers inside the key numbers list, like so:
    • [2, 3, 1] * 25 = [50, 75, 25]
  3. For each letter in the message take the corresponding number in the key numbers list and then get the new letter by summing the current place in alphabet plus the corresponding number in the key number list
    • If there is no more key number list, we start over from the first number in the list

How to use

CLI Interface

You can encrypt or decrypt yout message only using your terminal.

$ python3 cli.py -h
usage: cli.py [-h] [-m MESSAGE] [-k KEY] [-s SHIFT] [-p POS] [-t TO]
Argument Flag Description
Message -m / --message The message to shift
Key -k / --key The key to use in the shifting process
Shift -s / --shift optional, the total steps to shift
Pos -p / --pos optional, the initial position of the message
To -t / --to optional, will move the correct amount of steps to move the message to this position. (requires -p value)

Simple shift

A simple shift, encrypting the message "Hello world" with the key 123.

$ python3 cli.py -m "Hello world" -k 123 -s 25
Gcikm vmokb

Decrypt a message

Using the result from the example above, its possible decrypt the message knowing the current position the message is.

$ python3 cli.py -m "Gcikm vmokb" -k 123 -s -25
Hello world

It is also posible to use the From and To arguments to decrypt a message.

$ python3 cli.py -m "Gcikm vmokb" -k 123 -p 25 -t 0
Hello world

Using From and To

In this example the message is decrypted and then is shifted +1.

$ python3 cli.py -m "Gcikm vmokb" -k 123 -p 25 -t 0 -s 1
Igomq xqumf
You might also like...
En- and decrypting text-messages by creating a key with of the fibonacci-sequence

En- and decrypting text-messages by creating a key with of the fibonacci-sequence. This key helps to create mathematical functions, whose zeros should generates the encrypted message.

This is a simple application to generate HD wallet addresses for cryptocurrency coins.

HD-Wallet-Address This is a mini service to generate addresses in the master HD-Wallet. It will use py_crypto_hd_wallet package as a base. Prerequisit

Generate Random ETH addresses and Private Keys and Saved to file.

ethgen.py Generate Random ETH addresses and Private Keys and Saved to file. ETH address the file is stored in ETH-address.txt. ETH private keys the fi

Generate a 2FA Code out of an 2FA Secret(Time-based only!)

2FA-Generator Generate a 2FA Code out of an 2FA Secret(Time-based only!) ❗ Pleas don't share this secrets/generated codes with someone. If someone kno

This program generate hashes from random salts
This program generate hashes from random salts

Hash Generator This program generate hashes from random salts. How to install Install this program using python 3 and pip: pip install . In the future

Generate bitcoin public and private keys and check if they match a filelist of existing addresses that have a nonzero balance

btc-heist Running Install deps, i.e., python3 -m pip install -r requirements.txt Download the CSV dump of all bitcoin addresses with a balance and cut

A simple Ethereum mining pool

A simple getWork pool for ethereum mining Payouts are still manual. TODO: write payouts when someone mines 10 blocks. Also, make the submit actually

A simple Ethereum mining pool

A simple getWork pool for ethereum mining

Learn Blockchains by Building One, A simple Blockchain in Python using Flask as a micro web framework.
Learn Blockchains by Building One, A simple Blockchain in Python using Flask as a micro web framework.

Blockchain ✨ Learn Blockchains by Building One Yourself Installation Make sure Python 3.6+ is installed. Install Flask Web Framework. Clone this repos

Owner
Peterson Adami Candido
Peterson Adami Candido
PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic.

PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, as well as pa

NCC Group Plc 162 Dec 21, 2022
Alpkunt 9 Sep 9, 2022
Hyval will store your information encrypted and decrypt it when needed

Hyval will store your information encrypted and decrypt it when needed

soroush safari 3 Oct 31, 2021
Privfiles - Encrypted file storage using Fernet with zero Javascript

Privfiles - Encrypted file storage using Fernet with zero Javascript Source code for the onion service: l3n6v6dm63frml22tlmzacnasvp7co7wylu4hhcs34ukxe

Ward 5 Jul 30, 2022
Get the length of the Instagram encrypted password

instagram-weak-encryption Get the length of the Instagram encrypted password Introduction Instagram and Facebook encrypt the password submitted at log

Giuseppe Criscione 19 Dec 9, 2022
Privfiles - Encrypted file storage using Fernet with zero Javascript

Privfiles - Encrypted file storage using Fernet with zero Javascript Source code for the onion service: l3n6v6dm63frml22tlmzacnasvp7co7wylu4hhcs34ukxe

null 5 Jul 30, 2022
This is an experimental AES-encrypted RPC API for ESP 8266.

URPC This is an experimental AES-encrypted RPC API for ESP 8266. Usage The server folder contains a sample ESP 8266 project. Simply set the values in

Ian Walton 1 Oct 26, 2021
theHasher Tool created for generate strong and unbreakable passwords by using Hash Functions.Generate Hashes and store them in txt files.Use the txt files as lists to execute Brute Force Attacks!

$theHasher theHasher is a Tool for generating hashes using some of the most Famous Hashes Functions ever created. You can save your hashes to correspo

SR18 6 Feb 2, 2022
Small utility to encrypt and decrypt messages

Safe Safe is a small utility to encrypt and decrypt messages using a pair of public and private keys. Installation You need to have GPG installed in y

Gustavo Eguez 2 Dec 21, 2021
Python app for encrypting messages with fernet cryptography.

Fernet Encryption Python app for encrypting messages with fernet cryptography. Github repo: https://github.com/mystic-repo/FernetEncryption PyPi: http

Mystic 1 May 28, 2022