Hands-on cryptography with python leverage the power of python to encrypt and decrypt data
Learn to evaluate and compare data encryption methods and attack cryptographic systems About This Book Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Who This Book Is For Hands-On Cryp...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England ; Mumbai :
Packt
2018.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630439306719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributor
- Table of Contents
- Preface
- Chapter 1: Obfuscation
- About cryptography
- Installing and setting up Python
- Using Python on Mac or Linux
- Installing Python on Windows
- Caesar cipher and ROT13
- Implementing the Caesar cipher in Python
- ROT13
- base64 encoding
- ASCII data
- Binary data
- XOR
- Challenge 1 - the Caesar cipher
- Challenge 2 - base64
- Challenge 3 - XOR
- Summary
- Chapter 2: Hashing
- MD5 and SHA hashes
- What are hashes?
- Windows password hashes
- Getting hashes with Cain
- MD4 and Unicode
- Cracking hashes with Google
- Cracking hashes with wordlists
- Linux password hashes
- Challenge 1 - cracking Windows hashes
- Challenge 2 - cracking many-round hashes
- Challenge 3 - cracking Linux hashes
- Summary
- Chapter 3: Strong Encryption
- Strong encryption with AES
- ECB and CBC modes
- ECB
- CBC
- Padding oracle attack
- Strong encryption with RSA
- Public key encryption
- RSA algorithm
- Implementation in Python
- Challenge - cracking RSA with similar factors
- Large integers in Python
- What's next?
- Cryptography within IoT
- ZigBee cryptographic keys
- Complexity of ZigBee key management
- Bluetooth - LE
- Summary
- Other Books You May Enjoy
- Index.