Logo

Cracking Codes with Python by Al Sweigart

Large book cover: Cracking Codes with Python

Cracking Codes with Python
by

Publisher: inventwithpython.com
Number of pages: 420

Description:
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Lecture Notes on CryptographyLecture Notes on Cryptography
by
This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.
(11903 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(11177 views)
Book cover: Foundations of CryptographyFoundations of Cryptography
by - Cambridge University Press
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
(13804 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(8370 views)