Amazon cover image
Image from Amazon.com

Practical cyptography in python : learning correct cryptography by example / Seth James Nielson and Christopher K. Monson

By: Contributor(s): Material type: TextTextPublication details: New York Apress 2022Description: 371pISBN:
  • 9781484276778
Subject(s): DDC classification:
  • 005.824 NIE-S
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Status Date due Barcode Item holds
Books Books BITS Pilani Hyderabad 003-007 General Stack (For lending) 005.824 NIE-S (Browse shelf(Opens below)) Available 45639
Total holds: 0

Develop a more excellent intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is misused. Cryptography is the lifeblood of the digital world's security infrastructure. From governments worldwide to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstanding. Developers building cryptographic operations into their applications are not typically experts in the subject and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are primarily taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What Youll Learn: Understand where cryptography is used, why, and how it gets misused. Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block cyphers such as AES and see how bad configurations break. Use message integrity and digital signatures to protect messages, Utilize modern symmetric cyphers such as AES-GCM and CHACHA Pr,actice the basics of public key cryptography, including ECDSA signatures, and Discover how RSA encryption can be broken if insecure padding is used. Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs

There are no comments on this title.

to post a comment.
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2015 BITS-Library, BITS-Hyderabad, India.