Logo

Hacking Secret Ciphers with Python

Large book cover: Hacking Secret Ciphers with Python

Hacking Secret Ciphers with Python
by


ISBN/ASIN: 1482614375
Number of pages: 436

Description:
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative and affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

Home page url

Download or read it online for free here:
Download link
(6.8MB, PDF)

Similar books

Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(10828 views)
Book cover: An introduction to CryptographyAn introduction to Cryptography
by
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17330 views)
Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(12119 views)
Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(15476 views)