๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hands-On Cryptography with Python: Leverage the Power of Python to Encrypt and Decrypt Data

โœ Scribed by Samuel Bowne


Publisher
Packt Publishing
Year
2018
Tongue
English
Leaves
124
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book Description Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is for Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

โœฆ Table of Contents


Title Page
Copyright and Credits
Hands-On Cryptography with Python
Packt Upsell
Why subscribe?
PacktPub.com
Contributor
About the author
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Get in touch
Reviews
Obfuscation
About cryptography
Installing and setting up Python
Using Python on Mac or Linux
Installing Python on Windows
Caesar cipher and ROT13
Implementing the Caesar cipher in Python
ROT13
base64 encoding
ASCII data
Binary data
XOR
Challenge 1 – the Caesar cipher
Challenge 2 – base64
Challenge 3 – XOR
Summary
Hashing
MD5 and SHA hashes
What are hashes?
Windows password hashes
Getting hashes with Cain
MD4 and Unicode
Cracking hashes with Google
Cracking hashes with wordlists
Linux password hashes
Challenge 1 – cracking Windows hashes
Challenge 2 – cracking many-round hashes
Challenge 3 – cracking Linux hashes
Summary
Strong Encryption
Strong encryption with AES
ECB and CBC modes
ECB
CBC
Padding oracle attack
Strong encryption with RSA
Public key encryption
RSA algorithm
Implementation in Python
Challenge – cracking RSA with similar factors
Large integers in Python
What's next?
Cryptography within IoT
ZigBee cryptographic keys
Complexity of ZigBee key management
Bluetooth – LE
Summary
Other Books You May Enjoy
Leave a review - let other readers know what you think


๐Ÿ“œ SIMILAR VOLUMES


Hands-On Cryptography with Python: Lever
โœ Samuel Bowne ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Learn to evaluate and compare data encryption methods and attack cryptographic systems</b></p><h4>Key Features</h4><ul><li>Explore popular and important cryptographic methods</li><li>Compare cryptographic modes and understand their limitations</li><li>Learn to perform attacks on cryptographic

Hands-On Cryptography with Python: Lever
โœ Samuel Bowne ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

<div><p><strong>Learn to evaluate and compare data encryption methods and attack cryptographic systems</strong></p><h4>Key Features</h4><ul><li>Explore popular and important cryptographic methods</li><li>Compare cryptographic modes and understand their limitations</li><li>Learn to perform attacks on

Cryptography with Python: Unlocking Digi
โœ Muhammad Abdullahi, Abdeladim Fadheli ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Independently Published ๐ŸŒ English

Cryptography with Python is a meticulously crafted guide aimed at equipping readers with the knowledge and skills necessary to apply cryptography effectively using Python, one of the most accessible and widely used programming languages today. This eBook explores the core principles of cryptography,

Python for Data Analysis: Data Wrangling
โœ Wes McKinney ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Looking for complete instructions on manipulating, processing, cleaning, and crunching structured data in Python? The second edition of this hands-on guide--updated for Python 3.5 and Pandas 1.0--is packed with practical cases studies that show you how to effectively solve a broad set of data analys