Logo

Hacking Secret Ciphers with Python

Large book cover: Hacking Secret Ciphers with Python

Hacking Secret Ciphers with Python
by


ISBN/ASIN: 1482614375
Number of pages: 436

Description:
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Download link
(6.8MB, PDF)

Similar books

Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(10474 views)
Book cover: Cracking Codes with PythonCracking Codes with Python
by - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(5958 views)
Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(7516 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(11651 views)