Cracking Codes with Python
by Al Sweigart
Publisher: inventwithpython.com 2018
Number of pages: 420
Description:
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
Download or read it online for free here:
Read online
(online html)
Similar books
Public-Key Cryptography: Theory and Practice
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13510 views)
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13510 views)
Practical Cryptography for Developers
by Svetlin Nakov - Nakov.com
This book will teach you the basics of applied cryptography in almost free of math style, following a step-by-step approach with lots of code examples and practical exercises (hands-on experience), just like when you learn Web development ...
(5928 views)
by Svetlin Nakov - Nakov.com
This book will teach you the basics of applied cryptography in almost free of math style, following a step-by-step approach with lots of code examples and practical exercises (hands-on experience), just like when you learn Web development ...
(5928 views)
Basic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14264 views)
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14264 views)
Practical Cryptography With Go
by Kyle Isom - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(7708 views)
by Kyle Isom - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(7708 views)