Get Free Shipping on orders over $79
Practical Cryptography in Python : Learning Correct Cryptography by Example - Christopher K. Monson

Practical Cryptography in Python

Learning Correct Cryptography by Example

By: Christopher K. Monson, Seth James Nielson

Paperback | 27 September 2019

At a Glance

Paperback


$74.99

or 4 interest-free payments of $18.75 with

 or 

Ships in 5 to 7 business days

Develop a greater intuition for the proper use of cryptography. This book demystifies cryptographic internals and teaches you how to write basic cryptographic algorithms in Python.



Cryptography is the life blood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted.



Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters.

The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why.




What You'll Learn

  • Understand where cryptography is used, why, and how it gets misused
  • Know what secure hashing is used for and its basic properties
  • Generate hashes in Python: recommended algorithms and why SHA-1 is being retired
  • Know what block ciphers are used for and their basic properties
  • Encrypt with AES in Python: recommended algorithms and modes, and what can go wrong
  • Know what public keys and private keys are used for and their basic properties, and how the security of an algorithm depends on parameters such as padding
  • Provide message integrity and digital signatures using keyed hashes and asymmetric cryptography; know how a certificate differs from a key, and why it matters
  • Securely generate a shared symmetric session key using asymmetric encryption
  • Use modern symmetric ciphers such as AES-GCM and CHACHA
  • Utilize TLC connections and modern technologies such as certificate pinning and certificate transparency (CT) logs






















Who This Book Is For



IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.

More in Programming & Scripting Languages

Coding For Dummies, All New Edition : For Dummies (Computer/Tech) - Paul McFedries
The C Programming Language : Prentice Hall Software - Brian Kernighan

RRP $107.04

$72.99

32%
OFF
Python All-in-One For Dummies : 3rd Edition - John C. Shovic

RRP $74.95

$55.75

26%
OFF
Introduction to Programming Languages - Gordon Hurley
Typesetting Mathematics With Latex - Robert Legato
PHP, MySQL, & JavaScript All-In-One For Dummies : For Dummies - Richard Blum
C# 12 in a Nutshell : The Definitive Reference - Joseph Albahari

RRP $133.00

$64.75

51%
OFF
Learning Go : An Idiomatic Approach to Real-World Go Programming - Jon Bodner
Python Automation For Dummies : For Dummies (Computer/Tech) - Alan Simpson
Programming Rust : Fast, Safe Systems Development 2nd Edition - Jason Orendorff