**Hacking Secret Ciphers with Python**

by Al Sweigart

2013**ISBN/ASIN**: 1482614375**Number of pages**: 436

**Description**:

The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Download or read it online for free here:

**Download link**

(6.8MB, PDF)

## Similar books

**Practical Cryptography for Developers**

by

**Svetlin Nakov**-

**Nakov.com**

This book will teach you the basics of applied cryptography in almost free of math style, following a step-by-step approach with lots of code examples and practical exercises (hands-on experience), just like when you learn Web development ...

(

**1893**views)

**Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial**

by

**Henk C. A. van Tilborg**-

**Springer**

This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.

(

**10637**views)

**Visual Cryptography and Its Applications**

by

**Jonathan Weir, WeiQi Yan**-

**BookBoon**

Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.

(

**7017**views)

**Lecture Notes on Cryptography**

by

**Shafi Goldwasser, Mihir Bellare**

This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.

(

**10396**views)