Logo

Cracking Codes with Python by Al Sweigart

Large book cover: Cracking Codes with Python

Cracking Codes with Python
by

Publisher: inventwithpython.com
Number of pages: 420

Description:
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Practical Cryptography With GoPractical Cryptography With Go
by - Leanpub
This is an introduction to cryptography for programmers; it doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We'll illustrate it using the Go programming language.
(7593 views)
Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(33252 views)
Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(11728 views)
Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13595 views)