Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Posted By: AlenMiler
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data by Samuel Bowne
English | 29 Jun. 2018 | ISBN: 1789534445 | 100 Pages | EPUB | 3.08 MB

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features
Explore popular and important cryptographic methods
Compare cryptographic modes and understand their limitations
Learn to perform attacks on cryptographic systems

Book Description
Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

What you will learn
Protect data with encryption and hashing
Explore and compare various encryption methods
Encrypt data using the Caesar Cipher technique
Make hashes and crack them
Learn how to use three NIST-recommended systems: AES, SHA, and RSA
Understand common errors in encryption and exploit them

Who This Book Is For
Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Table of Contents
Obfuscation
Hashing
Strong Encryption