
Skunkwerks
Cryptography Studio
Asymmetric Cryptography Lab
Craft, inspect, and demo public-key flows in minutes.
This Vercel-ready wireframe highlights every touchpoint in an asymmetric exchange—key creation, sharing, encryption, and verification—complete with theming controls so you can present it in any briefing.
Pick an accent pack to stage your cryptography story.
Paraphrase
Label and mint a key pair
Use a memorable paraphrase to headline this demo. We'll hash it for display and generate a fresh RSA key pair in the browser.
Waiting for paraphrase
Generated keys
Awaiting paraphrasePublic key
Generate to preview the PEM block.
Private key
Generate to preview the PEM block.
Keys never leave this browser tab. Refresh to wipe them or copy into your actual asymmetric demo.
Password generator
Provision strong passphrases instantly
Choose length, toggles, and ambiguity preferences. We use the browser's secure random source to craft each password.
AI word passphrase
Let AI choose unrelated but pronounceable words
Dial how long each word can be, how many words you want, and whether to stitch them with dashes or camel casing.
Separator style
Visual console for asymmetric demos
Explain how public and private keys dance—without touching a whiteboard.
Blend shapes, metrics, and annotated flows to show exactly why only the intended party can decipher a payload.
Current Signal
Emerald Pulse
Perfect for
- • Executive-ready walkthroughs
- • Developer deep dives
- • Security tabletop drills
Key lifecycle
Emerald PulseWalk stakeholders through every asymmetric checkpoint before a single line of code ships.
- Generate key pairs42ms
Alice + Bob each mint a mathematically linked public/private key.
- Publish public keycache hit
Directory service advertises each public key through HTTPS.
- Encrypt messageAES-256-GCM
Sender encrypts plaintext with recipient public key and a random IV.
- Decrypt privatelysecure enclave
Recipient unlocks ciphertext locally; private key never leaves device.
Transmission timeline
Use this strip to narrate how ciphertext stays safe in transit.
Alice ⟶ Bob
Bob exposes his public key fingerprint via Vercel Edge Function.
Session Key
Ephemeral symmetric key is sealed with Bob's public key + nonce.
Signature
Alice signs digest with her private key so Bob can confirm origin.
Ciphertext
Bob decrypts + renders message in the private viewport only.
Key Studio
Visualize how primes + totients craft compatible locks.
- RSA + Curve25519
- Key rotation planner
- Share-safe view
Trust Radar
Simulate what an attacker sees without the private key.
- Integrity alerts
- Replay detector
- Challenge issuer
Session Forge
Experiment with hybrid encryption (ECIES + AES) for payloads.
- Entropy meter
- Nonce tracker
- Vault export