
Hands-on Cryptography with Python
Master Cryptographic Foundations with Real-World Implementation for Secure System Development Using Python (English Edition)
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Hands-on Cryptography with Python
Master Cryptographic Foundations with Real-World Implementation for Secure System Development Using Python (English Edition)
About this book
Master Cryptography with Python: From History to Real-World Implementation.
Book Description
Cryptography is the backbone of modern digital security, and Python makes it accessible for everyone. Hands-on Cryptography with Python takes readers from foundational concepts to advanced cryptographic systems, equipping them with both theoretical understanding and practical implementation skills using Python.
You'll begin with setting up the platform and Installation and move on to understanding the basics of cryptography—exploring classic ciphers, their evolution, and their role in secure communication. Next, you'll advance to Symmetric Key Cryptography and Asymmetric Key Cryptography, learning how to implement encryption algorithms step-by-step with Python.
As you progress, you'll dive into essential cryptographic components like Hashing and Message Integrity, enabling you to safeguard data and verify its authenticity. The book then introduces miscellaneous cryptographic schemes and highlights the principle that "Security is Only as Strong as the Weakest Link", encouraging you to identify and address vulnerabilities.
Toward the final stages, you'll gain hands-on expertise in TLS Communication, the backbone of secure data exchange on the web. The journey culminates with an exploration of current trends in cryptography, including lightweight cryptography and post-quantum solutions, ensuring you stay ahead in this ever-evolving field.
Table of Contents
1. Platform Setup and Installation2. Introduction to Cryptography3. Symmetric Key Cryptography4. Asymmetric Key Cryptography5. Hashing6. Message Integrity7. Miscellaneous Crypto Schemes8. Security is Only as Strong as the Weakest Link9. TLS Communication10. Latest Trends in Cryptography
Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Technical Reviewer
- Acknowledgements
- Preface
- Get a Free eBook
- Errata
- Table of Contents
- 1. Platform Setup and Installation
- 2. Introduction to Cryptography
- 3. Symmetric Key Cryptography
- 4. Asymmetric Key Cryptography
- 5. Hashing
- 6. Message Integrity
- 7. Miscellaneous Crypto Schemes
- 8. Security is Only as Strong as the Weakest Link
- 9. TLS Communication
- 10. Latest Trends in Cryptography
- Index