Cryptographic Algorithms with Python : Algorithms for Effective Python Implementations

Cryptographic Algorithms with Python : Algorithms for Effective Python Implementations

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9781484240830
  • DDC分類 005

Full Description


Gain the basic concepts of cryptography and implement a number of cryptographic algorithms in Python. After going through a crash course in Python programming covering concepts such as loops, functions, and conditional statements, you will take a look at various inbuilt libraries in Python which support cryptography implementations. Beginning with simple ciphers such as Reverse, ROT13, and XOR, you'll move towards classic ciphers such as Transposition and Vigenere. You will also gain an understanding of encrypting and decrypting files following Python standards. Further you will learn to encrypt your data with monoalphabetic ciphers such as Caesar and Affine. Finally, you will master the concepts of symmetric and public key cryptography by diving into the DES and RSA algorithms.Each program featured in the book will be accompanied by the complete code with flow charts and a detailed explanation of the concepts.What You Will LearnUnderstand the concepts of cryptography and Python modulesApply text-based encryption techniquesEncrypt and decrypt files based on Python standardsWork with monoalphabetic and polyalphabetic ciphersWho This Book Is ForPeople new to cryptography with a basic knowledge of Python programming.

Contents

Chapter 01various algorithmsSections:History of CryptographySteganographyEvolutionUnderstanding modern and classic cryptographyTerminologies and FeaturesPrimitivesUse of Cryptography in Data ScienceWhy Python?Chapter 02: Python RefresherUnderstanding the basics of Python language with functions, loops and conditional statements. It includes the demonstration of running python language.Sections:Understanding concepts (useful for this book)Conditional StatementsLooping structuresPackagesChapter 03: Reversed Encryption using Reverse CipherUnderstanding Reverse cipher algorithm with flowchart and python code for implementing the same.Sections:Understanding Reverse CipherAlgorithmFlowchartPython Code with OutputDrawbacks (with hacking source code)Chapter 04: Simple Encryption with ROT13 CipherUnderstanding concepts of ROT13 algorithm along with python code.Sections:Understanding ROT13 CipherAlgorithmFlowchartPython Code with OutputDrawbacks Chapter 05: Addition with XOR CipherUnderstanding concepts of XOR algorithm along with python code.Sections:Understanding XOR CipherAlgorithmFlowchartPython Code with OutputDrawbacks Chapter 06: Binary to ASCII using Base64 CipherUnderstanding concepts of Base64 with illustration and python code.Sections:Understanding Base64 encoding with illustrationAlgorithmFlowchartPython Code with OutputDrawbacks Chapter 07: Single-alphabet Substitution with Caesar CipherUnderstanding Caesar cipher algorithm, flowchart and python code for same with encryption and decryption standardsSections:Understanding Caesar Cipher with illustrationAlgorithmFlowchartPython Code with OutputDrawbacksChapter 08: Plain-text Cryptography with Transposition CipherUnderstanding transposition cipher algorithm, flowchart and python code for same with encryption and decryption standardsSections:Understanding Transposition Cipher with illustrationAlgorithmFlowchartPython Code with OutputDrawbacks Chapter 09: File Encryption and Decryption Understanding the procedure of how to encrypt and decrypt files following python standards.Sections:Importance of Encrypting filesPatternAlgorithmPython code for encryption and decryptionChapter 10: In-build Python Modules Various inbuilt libraries which support cryptography tool implementation.Sections:Cryptography modulePasswords with FernetPycryptoGPGME BindingsSecure hashes and message digestsChapter 11: Mono-alphabetic Substitution using Affine CipherUnderstanding affine cipher with algorithm, example and python code for demonstration.Sections:Understanding Multiplicative CipherUnderstanding Affine CipherAlgorithmFlowchartPython Code with OutputHacking Affine CipherChapter 12: Alphabetic Encryption using Vignere CipherUnderstanding concepts of vignere cipher with python code implementationSections:Understanding Vignere CipherAlgorithmFlowchartPython Code with OutputHacking Vignere CipherChapter 13: Substitution using Polyalphabetic CipherUnderstanding polyalphabetic cipher and its difference with Monoalphabetic cipher along with python code implementation.Sections:Understanding Polyalphabetic Cipher (one-time pad and two-time pad)AlgorithmFlowchartPython Code with OutputHacking one time pad cipherHacking two time pad cipherChapter 14: Symmetric-key CryptographyUnderstanding symmetric cryptography concepts, DES algorithm and implementation of DES algorithm along with hacking tricks.Sections:Symmetric cryptography conceptsExamplesDES AlgorithmFlowchartPython code for DES AlgorithmHacking DES AlgorithmChapter 15: Public-key CryptographyUnderstanding concepts of public key cryptography, RSA algorithm and its implementation using Python code.Sections:Asymmetric cryptography (Public Key cryptography)ExamplesRSA AlgorithmFlowchartPython code for RSA AlgorithmHacking RSA Algorithm (Why it is so difficult to hack RSA algorithm)Alternatives

最近チェックした商品