Logo

Hacking Secret Ciphers with Python

Large book cover: Hacking Secret Ciphers with Python

Hacking Secret Ciphers with Python
by


ISBN/ASIN: 1482614375
Number of pages: 436

Description:
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Download link
(6.8MB, PDF)

Similar books

Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(11947 views)
Book cover: Invent with PythonInvent with Python
by - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(7839 views)
Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(28681 views)
Book cover: Advances in Cryptology - CRYPTO'96Advances in Cryptology - CRYPTO'96
by - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
(4988 views)