Logo

Cracking Codes with Python by Al Sweigart

Large book cover: Cracking Codes with Python

Cracking Codes with Python
by

Publisher: inventwithpython.com
Number of pages: 420

Description:
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: An introduction to CryptographyAn introduction to Cryptography
by
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17572 views)
Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(12454 views)
Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34052 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(14002 views)