Get Free Shipping on orders over $79
Hands-On Cryptography with Python : Leverage the power of Python to encrypt and decrypt data - Samuel Bowne

Hands-On Cryptography with Python

Leverage the power of Python to encrypt and decrypt data

By: Samuel Bowne

eText | 29 June 2018 | Edition Number 1

At a Glance

eText


$40.69

or 4 interest-free payments of $10.17 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Learn to evaluate and compare data encryption methods and attack cryptographic systems

About This Book

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic systems

Who This Book Is For

Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

What You Will Learn

  • Protect data with encryption and hashing
  • Explore and compare various encryption methods
  • Encrypt data using the Caesar Cipher technique
  • Make hashes and crack them
  • Learn how to use three NIST-recommended systems: AES, SHA, and RSA
  • Understand common errors in encryption and exploit them

In Detail

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

Style and approach

A practical guide that will help the readers to encrypt their data with ease

on
Desktop
Tablet
Mobile

More in Data Encryption