登录 注册
当前位置:主页 > 资源下载 > 10 > Hacking.Secret.Ciphers.with.Python.B00WOY87ZU下载

Hacking.Secret.Ciphers.with.Python.B00WOY87ZU下载

  • 更新:2024-11-30 18:50:56
  • 大小:6.97MB
  • 推荐:★★★★★
  • 来源:网友上传分享
  • 类别:Python - 后端
  • 格式:PDF

资源介绍

Title: Hacking Secret Ciphers with Python Author: Al Sweigart Length: 718 pages Edition: 1 Language: English Publication Date: 2015-04-24 ISBN-10: B00WOY87ZU Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers. Unfortunately, the programs in this book won’t get the reader in trouble with the law (or rather, fortunately) but it is a guide on the basics of both cryptography and the Python programming language. Instead of presenting a dull laundry list of concepts, this book provides the source code to several fun programming projects for adults and young adults. Table of Contents Chapter 1 - Making Paper Cryptography Tools Chapter 2 - Installing Python Chapter 3 - The Interactive Shell Chapter 4 - Strings and Writing Programs Chapter 5 - The Reverse Cipher Chapter 6 - The Caesar Cipher Chapter 7 - Hacking the Caesar Cipher with the Brute-Force Technique Chapter 8 - Encrypting with the Transposition Cipher Chapter 9 - Decrypting with the Transposition Cipher Chapter 10 - Programming a Program to Test Our Program Chapter 11 - Encrypting and Decrypting Files Chapter 12 - Detecting English Programmatically Chapter 13 - Hacking the Transposition Cipher Chapter 14 - Modular Arithmetic with the Multiplicative and Affine Ciphers Chapter 15 - The Affine Cipher Chapter 16 - Hacking the Affine Cipher Chapter 17 - The Simple Substitution Cipher Chapter 18 - Hacking the Simple Substitution Cipher Chapter 19 - The Vigenère Cipher Chapter 20 - Frequency Analysis Chapter 21 - Hacking the Vigenère Cipher Chapter 22 - The One-Time Pad Cipher Chapter 23 - Finding Prime Numbers Chapter 24 - Public Key Cryptography and the RSA Cipher