Skip to main content

A terrible encryption scheme, like rot13 but keyboards

Project description

rot-kbd

A highly insecure encryption scheme based on rot13 and keyboard layouts

Use as a Python module

>>> from rot_kbd import *

>>> rot_wertyq('qwerty')
'wertyu'
>>> rot_yqwert(rot_wertyq('qwerty'))
'qwerty'

>>> rot_wertyq('wasd')
'esdf'
>>> rot_yqwert(rot_wertyq('wasd'))
'wasd'

Or on the command line

$ echo 'qwerty' | python -mrot_kbd
wertyu
$ echo 'qwerty' | python -mrot_kbd | python -mrot_kbd --rotation rot_yqwert
qwerty

Supposedly Asked Questions

Is this secure?

Absolutely not, it's not even close. rot_wertyq and rot_yqwert are certified upto an adversary rated SA 8.75 (Sibling, Age 8¾).

Is this some kind-a joke?

Yes. We prefer them to mean jokes.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rot-kbd-2024.4.1.post1.tar.gz (3.4 kB view details)

Uploaded Source

Built Distribution

rot_kbd-2024.4.1.post1-py3-none-any.whl (3.7 kB view details)

Uploaded Python 3

File details

Details for the file rot-kbd-2024.4.1.post1.tar.gz.

File metadata

  • Download URL: rot-kbd-2024.4.1.post1.tar.gz
  • Upload date:
  • Size: 3.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.11.8

File hashes

Hashes for rot-kbd-2024.4.1.post1.tar.gz
Algorithm Hash digest
SHA256 be1aca733a6f7edcfcc577a956d45a5637a5920963ca805e4db1224d1a6d117d
MD5 4b5277676299d16102d65ec888eccd8d
BLAKE2b-256 bcfc689a7a28733956a919e0f19e7bdb61e6c04fcd0904563fc97999dc64008c

See more details on using hashes here.

File details

Details for the file rot_kbd-2024.4.1.post1-py3-none-any.whl.

File metadata

File hashes

Hashes for rot_kbd-2024.4.1.post1-py3-none-any.whl
Algorithm Hash digest
SHA256 fc08ea75f3a2b15d55c9069d7de08972292e81483fee130295de4155fc1b2988
MD5 6b754d85c92e6123b6d913c6031b42b1
BLAKE2b-256 c1fc714b6020c691aec0ee440d7d0efdac02f425242faf541efeda0a04e70573

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page