0%

Book Description

Learn to evaluate and compare data encryption methods and attack cryptographic systems

About This Book
  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic systems
Who This Book Is For

Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

What You Will Learn
  • Protect data with encryption and hashing
  • Explore and compare various encryption methods
  • Encrypt data using the Caesar Cipher technique
  • Make hashes and crack them
  • Learn how to use three NIST-recommended systems: AES, SHA, and RSA
  • Understand common errors in encryption and exploit them
In Detail

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

Style and approach

A practical guide that will help the readers to encrypt their data with ease

Table of Contents

  1. Title Page
  2. Copyright and Credits
    1. Hands-On Cryptography with Python
  3. Packt Upsell
    1. Why subscribe?
    2. PacktPub.com
  4. Contributor
    1. About the author
    2. Packt is searching for authors like you
  5. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
      1. Download the example code files
      2. Download the color images
      3. Conventions used
    4. Get in touch
      1. Reviews
  6. Obfuscation
    1. About cryptography
    2. Installing and setting up Python
      1. Using Python on Mac or Linux
      2. Installing Python on Windows
    3. Caesar cipher and ROT13
      1. Implementing the Caesar cipher in Python
      2. ROT13
    4. base64 encoding
      1. ASCII data
      2. Binary data
    5. XOR
    6. Challenge 1 – the Caesar cipher
    7. Challenge 2 – base64
    8. Challenge 3 – XOR
    9. Summary
  7. Hashing
    1. MD5 and SHA hashes
      1. What are hashes?
    2. Windows password hashes
      1. Getting hashes with Cain
      2. MD4 and Unicode
      3. Cracking hashes with Google
      4. Cracking hashes with wordlists
    3. Linux password hashes
    4. Challenge 1 – cracking Windows hashes
    5. Challenge 2 – cracking many-round hashes
    6. Challenge 3 – cracking Linux hashes
    7. Summary
  8. Strong Encryption
    1. Strong encryption with AES
    2. ECB and CBC modes
      1. ECB
      2. CBC
    3. Padding oracle attack
    4. Strong encryption with RSA
      1. Public key encryption
      2. RSA algorithm
      3. Implementation in Python
    5. Challenge – cracking RSA with similar factors
      1. Large integers in Python
    6. What's next?
      1. Cryptography within IoT
      2. ZigBee cryptographic keys
      3. Complexity of ZigBee key management
      4. Bluetooth – LE
    7. Summary
  9. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
18.118.195.162