Jump to content
Usr6

Hacking Secret Ciphers with Python

Recommended Posts

Posted

cover_hackingciphers_thumb.png

Encrypt messages and hack ciphers!

“Hacking Secret Ciphers with Python” teaches complete beginners how to program in the Python programming language. The reader not only learns about several classical ciphers, but also how to write programs that encrypt and hack these ciphers. The full source code is given and explained line-by-line for ciphers such as the Caesar cipher, transposition cipher, simple substitution cipher, multiplicative & affine ciphers, Vigenere cipher, and hacking programs for each of these ciphers. The final chapters cover public key cryptography and the modern RSA cipher.

Cuprins:

Chapter 1 - Making Paper Cryptography Tools

Chapter 2 - Downloading and Installing Python

Chapter 3 - The Interactive Shell

Chapter 4 - Strings and Writing Programs

Chapter 5 - The Reverse Cipher

Chapter 6 - The Caesar Cipher

Chapter 7 - Hacking the Caesar Cipher with the Brute Force Technique

Chapter 8 - The Transposition Cipher, Encrypting

Chapter 9 - The Transposition Cipher, Decrypting

Chapter 10 - Programming a Program to Test Our Program

Chapter 11 - Encrypting and Decrypting Files

Chapter 12 - Detecting English Programmatically

Chapter 13 - Hacking the Transposition Cipher

Chapter 14 - Modular Arithmetic and the Multiplicative Cipher

Chapter 15 - The Affine Cipher

Chapter 16 - Hacking the Affine Cipher

Chapter 17 - The Simple Substitution Cipher

Chapter 18 - Hacking the Simple Substitution Cipher

Chapter 19 - The Vigenère Cipher

Chapter 20 - Frequency Analysis

Chapter 21 - Hacking the Vigenère Cipher

Chapter 22 - The One-Time Pad Cipher

Chapter 23 - Finding Prime Numbers

Chapter 24 - Public Key Cryptography and the RSA Cipher

Online: Hacking Secret Ciphers with Python - Chapters

Download: http://inventwithpython.com/hackingciphers.pdf

Source Code: Hacking Secret Ciphers with Python - Source

Practice Exercises: Hacking Secret Ciphers with Python - Buggy Programs

Book's Blog: The “Invent with Python” Blog

Donatii, contact, etc.: Hacking Secret Ciphers with Python

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...