000 | 04405cam a2200469Ia 4500 | ||
---|---|---|---|
001 | on1176314918 | ||
003 | OCoLC | ||
005 | 20220711203610.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200723s2020 inu o 001 0 eng d | ||
040 |
_aYDX _beng _cYDX _dEBLCP _dDG1 |
||
019 | _a1178642863 | ||
020 |
_a9781119612216 _q(electronic bk. : oBook) |
||
020 |
_a1119612217 _q(electronic bk. : oBook) |
||
020 |
_a9781119612223 _q(electronic bk.) |
||
020 |
_a1119612225 _q(electronic bk.) |
||
020 | _z1119612209 | ||
020 | _z9781119612209 | ||
035 |
_a(OCoLC)1176314918 _z(OCoLC)1178642863 |
||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8/24 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBray, Shannon, _d1972- _99167 |
|
245 | 1 | 0 |
_aImplementing cryptography using Python _h[electronic resource] / _cShannon W. Bray. |
260 |
_aIndianapolis : _bWiley, _c2020. |
||
300 | _a1 online resource | ||
505 | 0 | _aCover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables | |
505 | 8 | _aUsing Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary | |
505 | 8 | _aChapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering | |
505 | 8 | _aAnalytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers | |
505 | 8 | _aScytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigenère Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem | |
500 | _aIncludes index. | ||
590 |
_aJohn Wiley and Sons _bWiley Frontlist Obook All English 2020 |
||
650 | 0 |
_aData encryption (Computer science) _99168 |
|
650 | 0 |
_aPython (Computer program language) _96666 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_cOriginal _z1119612209 _z9781119612209 _w(OCoLC)1107565520 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119612216 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69307 _d69307 |