Book Image

Hands-On Cryptography with Python

By : Samuel Bowne
Book Image

Hands-On Cryptography with Python

By: Samuel Bowne

Overview of this book

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption.
Table of Contents (9 chapters)

Appendix 1. Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

Python Penetration Testing Cookbook

Rejah Rehim

ISBN: 978-1-78439-977-1

  • Learn to configure Python in different environment setups
  • Find an IP address from a web page using BeautifulSoup and Scrapy
  • Discover different types of packet sniffing script to sniff network packets
  • Master layer-2 and TCP/ IP attacks
  • Master techniques for exploit development for Windows and Linux
  • Incorporate various network- and packet-sniffing techniques using Raw sockets and Scrapy

Python for Offensive PenTest

Hussam Khrais

ISBN: 978-1-78883-897-9

  • Code your own reverse shell (TCP and HTTP)
  • Create your own anonymous shell by interacting with Twitter, Google Forms, and SourceForge
  • Replicate Metasploit features and build an advanced shell
  • Hack passwords using multiple techniques (API hooking, keyloggers, and clipboard hijacking)
  • Exfiltrate data from your target
  • Add encryption (AES, RSA, and XOR) to your shell to learn how cryptography is being abused by malware
  • Discover privilege escalation on Windows with practical examples
  • Countermeasures against most attacksld your own Windows IoT Face Recognition door locking system