Hands-On Cryptography with Python

Hands-On Cryptography with Python

Product ID: 1789534445 Condition: USED (All books in used condition)

Payflex: Pay in 4 interest-free payments of R131.50. Read the FAQ
R 526
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Condition - Very Good

The item shows wear from consistent use but remains in good condition. It may arrive with damaged packaging or be repackaged.

Hands-On Cryptography with Python

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features
  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic systems
Book Description

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

What you will learn
  • Protect data with encryption and hashing
  • Explore and compare various encryption methods
  • Encrypt data using the Caesar Cipher technique
  • Make hashes and crack them
  • Learn how to use three NIST-recommended systems: AES, SHA, and RSA
  • Understand common errors in encryption and exploit them
Who This Book Is For

Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Table of Contents
  1. Obfuscation
  2. Hashing
  3. Strong Encryption

Technical Specifications

Country
USA
Brand
Packt Publishing
Manufacturer
Packt Publishing
Binding
Paperback
ReleaseDate
2018-06-29T00:00:01Z
UnitCount
1
EANs
9781789534443