Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Предна корица
Packt Publishing Ltd, 29.06.2018 г. - 100 страници

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key FeaturesExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsBook Description

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

What you will learnProtect data with encryption and hashingExplore and compare various encryption methodsEncrypt data using the Caesar Cipher techniqueMake hashes and crack themLearn how to use three NIST-recommended systems: AES, SHA, and RSAUnderstand common errors in encryption and exploit themWho this book is for

Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.


Избрани страници


Strong Encryption
Other Books You May Enjoy
Авторско право

Други издания - Преглед на всички

Често срещани думи и фрази

Информация за автора (2018)

Samuel Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences. Credentials: PhD, CISSP, DEF CON Black-Badge Co-Winner