Logo

Cracking Codes with Python by Al Sweigart

Large book cover: Cracking Codes with Python

Cracking Codes with Python
by

Publisher: inventwithpython.com
Number of pages: 420

Description:
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(16533 views)
Book cover: Hacking Secret Ciphers with PythonHacking Secret Ciphers with Python
by
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(25341 views)
Book cover: Quantum CryptographyQuantum Cryptography
by - arXiv
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The fast progress in theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
(16835 views)
Book cover: Elementary CryptanalysisElementary Cryptanalysis
by - American Photographic Publishing Co.
A classic introduction to codebreaking, focusing on techniques for deciphering simple ciphers. It covers substitution and transposition ciphers and methods to analyze encrypted messages, offering both theoretical insights and practical examples.
(4467 views)