Asymmetric cryptography showcase logo

Skunkwerks

Cryptography Studio

Asymmetric Cryptography Lab

Craft, inspect, and demo public-key flows in minutes.

This Vercel-ready wireframe highlights every touchpoint in an asymmetric exchange—key creation, sharing, encryption, and verification—complete with theming controls so you can present it in any briefing.

Mode
Theme

Pick an accent pack to stage your cryptography story.

Paraphrase

Label and mint a key pair

Use a memorable paraphrase to headline this demo. We'll hash it for display and generate a fresh RSA key pair in the browser.

Waiting for paraphrase

Generated keys

Awaiting paraphrase

Public key

Generate to preview the PEM block.

Private key

Generate to preview the PEM block.

Keys never leave this browser tab. Refresh to wipe them or copy into your actual asymmetric demo.

Password generator

Provision strong passphrases instantly

Choose length, toggles, and ambiguity preferences. We use the browser's secure random source to craft each password.

Enterprise strength
Length18 characters
Generate to preview your password.

AI word passphrase

Let AI choose unrelated but pronounceable words

Dial how long each word can be, how many words you want, and whether to stitch them with dashes or camel casing.

Powered by OpenAI

Separator style

AI-selected words will appear here.
Cipher Canvas

Visual console for asymmetric demos

Explain how public and private keys dance—without touching a whiteboard.

Blend shapes, metrics, and annotated flows to show exactly why only the intended party can decipher a payload.

Emerald Pulse paletteDay ready

Current Signal

Emerald Pulse

Balanced + trustworthy
Accent hue #059669 keeps callouts obvious without breaking focus.

Perfect for

  • • Executive-ready walkthroughs
  • • Developer deep dives
  • • Security tabletop drills

Key lifecycle

Emerald Pulse

Walk stakeholders through every asymmetric checkpoint before a single line of code ships.

  • Generate key pairs42ms

    Alice + Bob each mint a mathematically linked public/private key.

  • Publish public keycache hit

    Directory service advertises each public key through HTTPS.

  • Encrypt messageAES-256-GCM

    Sender encrypts plaintext with recipient public key and a random IV.

  • Decrypt privatelysecure enclave

    Recipient unlocks ciphertext locally; private key never leaves device.

Transmission timeline

Use this strip to narrate how ciphertext stays safe in transit.

Handshake12 ms

Alice ⟶ Bob

Bob exposes his public key fingerprint via Vercel Edge Function.

Payload48 bytes

Session Key

Ephemeral symmetric key is sealed with Bob's public key + nonce.

VerificationSHA-3

Signature

Alice signs digest with her private key so Bob can confirm origin.

Delivery0 leaks

Ciphertext

Bob decrypts + renders message in the private viewport only.

Key Studio

Visualize how primes + totients craft compatible locks.

  • RSA + Curve25519
  • Key rotation planner
  • Share-safe view

Trust Radar

Simulate what an attacker sees without the private key.

  • Integrity alerts
  • Replay detector
  • Challenge issuer

Session Forge

Experiment with hybrid encryption (ECIES + AES) for payloads.

  • Entropy meter
  • Nonce tracker
  • Vault export