Logo

Hacking Secret Ciphers with Python

Large book cover: Hacking Secret Ciphers with Python

Hacking Secret Ciphers with Python
by


ISBN/ASIN: 1482614375
Number of pages: 436

Description:
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Download link
(6.8MB, PDF)

Similar books

Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(25739 views)
Book cover: The Laws of Cryptography with Java CodeThe Laws of Cryptography with Java Code
by - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(7634 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(10424 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(5621 views)