**Cracking Codes with Python**

by Al Sweigart

**Publisher**: inventwithpython.com 2018**Number of pages**: 420

**Description**:

Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Download or read it online for free here:

**Read online**

(online html)

## Similar books

**Lecture Notes on Cryptography**

by

**Shafi Goldwasser, Mihir Bellare**

This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.

(

**13802**views)

**Foundations of Cryptography**

by

**Oded Goldreich**-

**Cambridge University Press**

The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.

(

**15357**views)

**Introduction to Modern Cryptography**

by

**Mihir Bellare, Phillip Rogaway**-

**University of California at Davis**

The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.

(

**14937**views)

**Hacking Secret Ciphers with Python**

by

**Al Sweigart**

The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.

(

**20456**views)