Invent with Python
by Al Sweigart
Publisher: inventwithpython.com 2011
Number of pages: 165
Description:
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
Download or read it online for free here:
Download link
(1.8MB, PDF)
Similar books
The Laws of Cryptography with Java Code
by Neal R. Wagner - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(12795 views)
by Neal R. Wagner - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(12795 views)
Quantum Cryptography
by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden - arXiv
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The fast progress in theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
(14434 views)
by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden - arXiv
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The fast progress in theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
(14434 views)
Mathematical Cryptology
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(14147 views)
by Keijo Ruohonen - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(14147 views)
Military Cryptanalysis
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(16824 views)
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(16824 views)