000 04405cam a2200469Ia 4500
001 on1176314918
003 OCoLC
005 20220711203610.0
006 m o d
007 cr |n|||||||||
008 200723s2020 inu o 001 0 eng d
040 _aYDX
_beng
_cYDX
_dEBLCP
_dDG1
019 _a1178642863
020 _a9781119612216
_q(electronic bk. : oBook)
020 _a1119612217
_q(electronic bk. : oBook)
020 _a9781119612223
_q(electronic bk.)
020 _a1119612225
_q(electronic bk.)
020 _z1119612209
020 _z9781119612209
035 _a(OCoLC)1176314918
_z(OCoLC)1178642863
050 4 _aQA76.9.A25
082 0 4 _a005.8/24
_223
049 _aMAIN
100 1 _aBray, Shannon,
_d1972-
_99167
245 1 0 _aImplementing cryptography using Python
_h[electronic resource] /
_cShannon W. Bray.
260 _aIndianapolis :
_bWiley,
_c2020.
300 _a1 online resource
505 0 _aCover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables
505 8 _aUsing Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary
505 8 _aChapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering
505 8 _aAnalytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers
505 8 _aScytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigenère Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem
500 _aIncludes index.
590 _aJohn Wiley and Sons
_bWiley Frontlist Obook All English 2020
650 0 _aData encryption (Computer science)
_99168
650 0 _aPython (Computer program language)
_96666
655 4 _aElectronic books.
_93294
776 0 8 _cOriginal
_z1119612209
_z9781119612209
_w(OCoLC)1107565520
856 4 0 _uhttps://doi.org/10.1002/9781119612216
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69307
_d69307