Hacking secret ciphers with Python: [a beginner's guide to cryptography and computer programming with Python]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 416 S. Ill., graph. Darst. |
ISBN: | 9781482614374 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041143308 | ||
003 | DE-604 | ||
005 | 20180301 | ||
007 | t | ||
008 | 130712s2013 ad|| |||| 00||| eng d | ||
020 | |a 9781482614374 |9 978-1-482614-37-4 | ||
035 | |a (OCoLC)856826509 | ||
035 | |a (DE-599)BVBBV041143308 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-188 | ||
084 | |a ST 324 |0 (DE-625)143660: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 366f |2 stub | ||
100 | 1 | |a Sweigart, Al |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking secret ciphers with Python |b [a beginner's guide to cryptography and computer programming with Python] |c by Al Sweigart |
250 | |a 1. ed. | ||
264 | 3 | |a Leipzig |b Amazon Distribution |c 2013 | |
300 | |a 416 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Python |g Programmiersprache |0 (DE-588)4434275-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Python |g Programmiersprache |0 (DE-588)4434275-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026118902&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026118902 |
Datensatz im Suchindex
_version_ | 1804150541878558720 |
---|---|
adam_text | TABLE OFCONTENTS
ABOUTTHISBOOK
6
TABLE
OFCONTENTS
7
CHAPTER
1-
MAKING
PAPER
CRYPTOGRAPHY
TOOLS
1
WHATISCRYPTOGRAPHY?
2
CODESVS.CIPHERS
3
MAKING
APAPER
CIPHER
WHEEL
4
AVIRTUAL
CIPHERWHEEL
7
HOWTOENCRYPT
WITHTHECIPHER
WHEEL
8
HOWTODECRYPT
WITHTHECIPHER
WHEEL
9
ADIFFERENT
CIPHER
TOOL:THEST.CYRSLIDE
10
PRACTICE
EXERCISES,
CHAPTER
I,SETA
II
DOINGCRYPTOGRAPHY
WITHOUT
PAPERTOOLS
II
PRACTICE
EXERCISES,
CHAPTER
I,SETB
13
DOUBLE-STRENGTH
ENCRYPTION?
13
PROGRAMMING
ACOMPUTER
TODOENCRYPTION
14
CHAPTER
2-INSTALLING
PYTHON
16
DOWNLOADING
ANDINSTALLING
PYTHON
17
DOWNLOADING
PYPERC1IP.PY
18
STARTING
IDLE
18
THEFEATURED
PROGRAMS
:
19
LINENUMBERS
ANDSPACES
20
TEXTWRAPPING
INTHISBOOK
20
TRACING
THEPROGRAM
ONLINE
21
CHECKING
YOURTYPEDCODEWITHTHEONLINE
DIFFTOOL
21
COPYING
ANDPASTING
TEXT
21
MOREINFOLINKS
22
PROGRAMMING
ANDCRYPTOGRAPHY
22
CHAPTER
3-THEINTERACTIVE
SHELL
26
SOMESIMPLEMATHSTUFF
26
INTEGERS
ANDFLOATING
POINTVALUES
27
EXPRESSIONS
27
ORDEROFOPERATIONS 28
EVALUATING
EXPRESSIONS
29
ERRORSAREOKAY!
29
PRACTICE
EXERCISES,
CHAPTER
3,SETA
30
EVERY
VALUE
HASADATATYPE
30
STORING
VALUES
INVARIABLES
WITHASSIGNMENT
STATEMENTS
30
OVERWRITING
VARIABLES
32
USING
MORE
THANONEVARIABLE
33
VARIABLE
NAMES
34
PRACTICE
EXERCISES,
CHAPTER
3,SETB
35
SUMMARY
-BUTWHEN
AREWE
GOING
TOSTARTHACKING?
35
CHAPTER
4
STRINGS
ANDWRITING
PROGRAMS
36
STRINGS
36
STRINGCONCATENATION
WITHTHE
+
OPERATOR
38
STRINGREPLICATION
WITHTHE
*
OPERATOR
39
PRINTING
VALUES
WITH
THE
PRINT()
FUNCTION
39
ESCAPE
CHARACTERS
40
QUOTES
ANDDOUBLE
QUOTES
41
PRACTICE
EXERCISES,
CHAPTER4,SETA
42
INDEXING
42
NEGATIVE
INDEXES
43
SLICING
44
BLANK
SLICE
INDEXES
45
PRACTICE
EXERCISES,
CHAPTER4,SETB
46
WRITING
PROGRAMS
INIDLE S
FILE
EDITOR
46
HELLO
WORLD!
47
SOURCE
CODE
OFHELLOWORLD
47
SAVING
YOURPROGRAM
47
RUNNING
YOURPROGRAM
48
OPENING
THEPROGRAMS
YOU VE
SAVED
49
HOW
THE HELLO
WORLD PROGRAM
WORKS
50
COMMENTS
50
FUNCTIONS
50
THEPRINT ()FUNCTION
51
THEINPUT
()FUNCTION
51
ENDING
THEPROGRAM
52
PRACTICE
EXERCISES,
CHAPTER
4,SETC
52
SUMMARY
52
CHAPTER
5-THEREVERSE
CIPHER
53
THEREVERSE
CIPHER
53
SOURCE
CODEOFTHEREVERSE
CIPHER
PROGRAM
54
SAMPLE
RUNOFTHEREVERSE
CIPHER
PROGRAM
54
CHECKING
YOUR
SOURCECODEWITHTHEONLINE
DIFFTOOL
55
HOWTHEPROGRAM
WORKS
55
THELEN
()FUNCTION
56
INTRODUCING
THEWHILE
LOOP
57
THEBOOLEAN
DATATYPE
58
COMPARISON
OPERATORS
58
CONDITIONS
61
BLOCKS
61
THEWHILE
LOOPSTATEMENT
62
GROWING
ASTRING
62
TRACING
THROUGH
THEPROGRAM,
STEPBYSTEP
65
USING
INPUT
()INOURPROGRAMS
67
PRACTICE
EXERCISES,
CHAPTER
5,SECTIONA
67
SUMMARY
68
CHAPTER
6-THECAESAR
CIPHER
69
IMPLEMENTING
APROGRAM
69
SOURCECODEOFTHECAESARCIPHERPROGRAM
70
SAMPLE
RUNOFTHECAESARCIPHERPROGRAM
71
CHECKING
YOUR
SOURCECODEWITHTHEONLINE
DIFFTOOL
72
PRACTICE
EXERCISES,
CHAPTER
6,SETA
72
HOWTHEPROGRAM
WORKS
72
IMPORTING
MODULES
WITHTHEIMPORT
STATEMENT
72
CONSTANTS
73
THEUPPER
()ANDLOWER
()
STRINGMETHODS
74
THE
FOR
LOOPSTATEMENT
75
AWHILE LOOPEQUIVALENT OFA FOR
LOOP
76
PRACTICE
EXERCISES,
CHAPTER
6,SETB
77
THEIF
STATEMENT
77
THEELSE
STATEMENT
78
THEELIF
STATEMENT
78
THEIN
ANDNOT
IN
OPERATORS
79
THE
FIND
()STRINGMETHOD
80
PRACTICE
EXERCISES,
CHAPTER
6,SETC
81
BACKTOTHECODE
81
DISPLAYING
ANDCOPYING
THEENCRYPTEDLDECRYPTED
STRING
83
ENCRYPTNON-LETTER
CHARACTERS
84
SUMMARY
85
CHAPTER
7-HACKING
THECAESAR
CIPHERWITHTHE
BRUTE-FORCE
TECHNIQUE
87
HACKING
CIPHERS
87
THEBRUTE-FORCE
ATTACK
88
SOURCECODEOFTHECAESARCIPHER
HACKERPROGRAM
88
SAMPLERUNOFTHECAESARCIPHER
HACKERPROGRAM
89
HOWTHEPROGRAM
WORKS
90
THERANGE
()FUNCTION
90
BACKTOTHECODE
92
STRINGFORMATTING
93
PRACTICE
EXERCISES,
CHAPTER
7,SETA
94
SUMMARY
94
CHAPTER8-ENCRYPTINGWITHTHETRANSPOSITION
CIPHER
95
ENCRYPTING
WITHTHETRANSPOSITION
CIPHER
95
PRACTICEEXERCISES,
CHAPTER
8,SETA
97
ATRANSPOSITION
CIPHERENCRYPTION
PROGRAM
97
SOURCECODEOFTHETRANSPOSITION
CIPHERENCRYPTION
PROGRAM
97
SAMPLERUNOFTHETRANSPOSITION
CIPHERENCRYPTION
PROGRAM
98
HOWTHEPROGRAM
WORKS
99
CREATING
YOUROWNFUNCTIONS
WITHDEF
STATEMENTS
99
THEPROGRAM S
MAIN()FUNCTION
100
PARAMETERS
101
VARIABLES
INTHEGLOBALANDLOCALSCOPE
103
THEGLOBAL STATEMENT
103
PRACTICE
EXERCISES,
CHAPTER
8,SETB
105
THELISTDATATYPE
105
USING
THELIST
()
FUNCTION
TOCONVERT
RANGEOBJECTS
TOLISTS
107
REASSIGNING
THEITEMSINLISTS
108
REASSIGNING
CHARACTERS
INSTRINGS
108
LISTSOFLISTS
108
PRACTICE
EXERCISES,
CHAPTER
8,SETC
109
USING
LEN
()
ANDTHEIN
OPERATOR
WITHLISTS
109
LISTCONCATENATION
ANDREPLICATION
WITHTHE
+
AND
*
OPERATORS
110
PRACTICE
EXERCISES,
CHAPTER
8,SETD
III
.
THETRANSPOSITION
ENCRYPTION
ALGORITHM
111
AUGMENTED
ASSIGNMENT
OPERATORS
113
BACKTOTHECODE
114
THEJOIN
()
STRINGMETHOD
116
RETURNVALUES
ANDRETURN
STATEMENTS
117
PRACTICE
EXERCISES,
CHAPTER
8,SETE
117
BACKTOTHECODE
118
THESPECIAL_NAME_VARIABLE
118
KEYSIZEANDMESSAGE
LENGTH
119
SUMMARY
119
CHAPTER
9-DECRYPTING
WITHTHETRANSPOSITION
CIPHER
121
DECRYPTING
WITHTHETRANSPOSITION
CIPHERONPAPER
122
PRACTICE
EXERCISES,
CHAPTER
9,SETA
123
ATRANSPOSITION
CIPHERDECRYPTION
PROGRAM
124
SOURCECODEOFTHETRANSPOSITION
CIPHER
DECRYPTION
PROGRAM
124
HOWTHEPROGRAM
WORKS
125
THERNATH.
CEIL
(),MATH.
FLOOR
()
ANDROUND
()
FUNETIONS
126
THEAND
ANDOR
BOOLEAN
OPERATORS
130
PRACTICE
EXCRCISES,
CHAPTER
9,SETB
131
TRUTHTABLES
131
THEAND
ANDOR
OPERATORS
ARESHORTCUTS
132
ORDEROFOPERATIONS
FORBOOLEAN
OPERATORS
133
BACKTOTHECODE
133
PRACTICE EXERCISES, CHAPTER 9,SETC
135
SUMMARY
135
CHAPTER
10
-PROGRAMMING
APROGRAM
TOTESTOURPROGRAM
136
SOURCECODEOFTHETRANSPOSITION
CIPHERTESTERPROGRAM
137
SAMPLERUNOFTHETRANSPOSITION
CIPHERTESTERPROGRAM
138
HOWTHEPROGRAM
WORKS
139
PSEUDORANDOM
NUMBERS
ANDTHE
RANDOM.SEED()
FUNCTION
139
THE
RANDOM.RANDINT
()
FUNCTION
141
REFERENCES
141
THE
COPY.DEEPCOPY()
FUNCTIONS
145
PRACTICE
EXERCISES,
CHAPTER
10,SETA
146
THE
RANDOM.SHUFFLE
()
FUNCTION
146
RANDOMLY
SCRAMBLING
ASTRING
147
BACKTOTHECODE
147
THE
SYS.EXIT()
FUNCTION
148
TESTING
OURTESTPROGRAM
149
SUMMARY
150
CHAPTER
11-
ENCRYPTING
ANDDECRYPTING
FILES
151
PLAINTEXTFILES
152
SOURCECODEOFTHETRANSPOSITION
FILECIPHERPROGRAM
152
SAMPLERUNOFTHETRANSPOSITION
FILECIPHERPROGRAM
155
READING
FROMFILES
155
WRITING
TOFILES
156
HOWTHEPROGRAM
WORKS
157
THE
OS.PATH.EXISTS
()
FUNCTION
158
THE
STARTSWI
TH()
AND
ENDSWITH()
STRINGMETHODS
159
THE
TI
T.LE
()
STRINGMETHOD
160
THE
TIME
MODULE
AND
TIME.TIME()
FUNCTION
161
BACKTOTHECODE
162
PRACTICE
EXERCISES,
CHAPTER
11,SETA
163
SUMMARY
163
CHAPTER
12-DETECTING
ENGLISHPROGRAMMATICALLY
164
HOWCANACOMPUTER
UNDERSTAND
ENGLISH?
165
PRACTICE
EXERCISES,
CHAPTER
12,SECTIONA
167
THEDETECTENGLISH MODULE
167
SOURCECODEFORTHEDETECT
ENGLISH
MODULE
167
HOWTHEPROGRAM
WORKS
168
DICTIONARIES
ANDTHEDICTIONARY
DATATYPE
169
ADDING
ORCHANGING
ITEMS
INADICTIONARY
170
PRACTICE
EXERCISES,
CHAPTER
12,SETB
171
USINGTHE
LEN()
FUNCTION
WITHDICTIONARIES
171
USINGTHE
IN
OPERATOR
WITHDICTIONARIES
171
USING
FOR
LOOPSWITHDICTIONARIES
172
PRACTICE
EXERCISES,
CHAPTER
12,SETC
172
THEDIFFERENCE
BETWEEN
DICTIONARIES
ANDLISTS
172
FINDING
ITEMSISFASTERWITHDICTIONARIES
THANLISTS
172
THE
SPLIT()
METHOD
173
THE
NONE
VALUE
174
BACKTOTHECODE
175
DIVIDE
BYZERO
ERRORS
176
THE
FLOAT
(),INT
(),
AND
STR
()
FUNCTIONS
ANDINTEGERDIVISION
177
PRACTICE
EXERCISES,
CHAPTER
12,SETD
178
BACKTOTHECODE
178
THE
APPENDT)
LISTMETHOD
179
DEFAULT
ARGUMENTS
180
CALCULATING
PERCENTAGE
181
PRACTICE
EXERCISES,
CHAPTER
12,SETE
182
SUMMARY
182
CHAPTER
13
-HACKING
THETRANSPOSITION
CIPHER
184
SOURCECODEOFTHETRANSPOSITION
CIPHER
HACKER
PROGRAM
184
SAMPLERUNOFTHETRANSPOSITION
BREAKER
PROGRAM
186
HOWTHEPROGRAM
WORKS
187
MULTI-LINE
STRINGSWITHTRIPLEQUOTES
187
BACKTOTHECODE
188
THE
STRIP
()
STRINGMETHOD
190
PRACTICE
EXERCISES,
CHAPTER
13,SETA
192
SUMMARY
192
CHAPTER
14
-MODULAR
ARITHMETIC
WITHTHE
MULTIPLICATIVE
ANDAFFINE
CIPHERS
193
OHNOMATH!
194
MATHOHYEAH! 194
MODULAR
ARITHMETIC
(AKACLOCKARITHMETIC)
194
THE%MODOPERATOR
196
PRACTICEEXERCISES,
CHAPTER
14,SETA
196
GCD:GREATEST
COMMON
DIVISOR
(AKAGREATEST
COMMON
FACTOR)
196
VISUALIZE
FACTORS
ANDGCDWITHCUISENAIRE
RODS
197
PRACTICE
EXERCISES,
CHAPTER
14,SETB
199
MULTIPLE
ASSIGNMENT
199
SWAPPINGVALUES
WITHTHEMULTIPLE
ASSIGNMENT
TRICK
200
EUCLID S
ALGORITHM
FORFINDING
THEGCDOFTWONUMBERS
200
RELATIVELY
PRIME
202
PRACTICE
EXERCISES,
CHAPTER
14,SETC
202
THEMULTIPLICATIVE
CIPHER
202
PRACTICEEXERCISES,
CHAPTER
14,SETD
204
MULTIPLICATIVE
CIPHER
+
CAESARCIPHER
=
THEAFFINECIPHER
204
THEFIRSTAFFINEKEYPROBLEM
204
DECRYPTING
WITHTHEAFFINECIPHER
205
FINDING
MODULAR
INVERSES
206
THE//
INTEGERDIVISION
OPERATOR
207
SOURCECODEOFTHECRYPTOMATH
MODULE
207
PRACTICE
EXERCISES,
CHAPTER
14,SETE
208
SUMMARY
208
CHAPTER
15
-THEAFFINE
CIPHER
210
SOURCECODEOFTHEAFFINECIPHERPROGRAM
211
SAMPLERUNOFTHEAFFINECIPHERPROGRAM
213
PRACTICEEXERCISES,
CHAPTER
15,SETA
213
HOWTHEPROGRAMWORKS
213
SPLITTINGONEKEYINTOTWOKEYS
215
THETUPLEDATATYPE
215
INPUTVALIDATION
ONTHEKEYS
216
THEAFFINECIPHERENCRYPTION
FUNCTION
217
THEAFFINECIPHERDECRYPTION
FUNCTION
218
GENERATING
RANDOMKEYS
219
THESECOND AFFINE KEYPROBLEM: HOWMANYKEYSCANTHEAFFINECIPHER
HAVE?
220
SUMMARY
222
CHAPTER
16
-HACKING
THEAFFINE
CIPHER
223
SOURCECODEOFTHEAFFINE
CIPHERHACKER
PROGRAM
223
SAMPLE
RUNOFTHEAFFINE
CIPHER
HACKER
PROGRAM
225
HOWTHEPROGRAM
WORKS
225
THEAFFINECIPHER
HACKING
FUNCTION
227
THE
**
EXPONENT
OPERATOR
227
THECONTINUE
STATEMENT
228
PRACTICE
EXERCISES,
CHAPTER
16,SETA
231
SUMMARY
231
CHAPTER
17
-THESIMPLE
SUBSTITUTION
CIPHER
232
THESIMPLE
SUBSTITUTION
CIPHERWITHPAPERANDPENCIL
233
PRACTICE
EXERCISES,
CHAPTER
17,SETA
233
SOURCECODEOFTHESIMPLE
SUBSTITUTION
CIPHER
234
SAMPLERUNOFTHESIMPLE
SUBSTITUTION
CIPHER
PROGRAM
236
HOWTHEPROGRAM
WORKS
236
THEPROGRAM S
MAIN()FUNCTION
237
THESORT
()LISTMETHOD
238
WRAPPER
FUNCTIONS
239
THEPROGRAM S
TRANSLATEMESSAGE
()FUNCTION
240
THEISUPPER
()ANDISLOWER
()STRINGMETHODS
242
PRACTICE
EXERCISES,
CHAPTER
17,SETB
244
GENERATING
ARANDOM
KEY
244
ENCRYPTING
SPACESANDPUNCTUATION
244
PRACTICE
EXERCISES,
CHAPTER
17,SETC
246
SUMMARY
246
CHAPTER
18
-HACKING
THESIMPLE
SUBSTITUTION
CIPHER
247
COMPUTING
WORDPATTEMS
248
GETTING
ALISTOFCANDIDATES
FORACIPHERWORD
249
PRACTICE
EXERCISES,
CHAPTER
18,SETA
250
SOURCECODEOFTHEWORDPATTERN
MODULE
250
SAMPLERUNOFTHEWORDPATTERN
MODULE
252
HOWTHEPROGRAM
WORKS
253
THEPPRINT. PPRINT ()ANDPPRINT. PFORMAT
()FUNCTIONS
253
BUILDING
STRINGSINPYTHON
WITHLISTS
254
CALCULATING
THEWORDPATTERN
255
THEWORDPATTERNPROGRAM S
MAIN()FUNCTION
256
HACKING
THESIMPLESUBSTITUTION
CIPHER
258
SOURCECODEOFTHESIMPLE
SUBSTITUTION
HACKING
PROGRAM
259
HACKING
THESIMPLE
SUBSTITUTION
CIPHER(INTHEORY)
262
EXPLORE
THEHACKING
FUNCTIONS
WITHTHEINTERACTIVE
SHELL
263
HOWTHEPROGRAM
WORKS
268
IMPORTALLTHETHINGS
268
ABRIEFINTRO
TOREGULAR
EXPRESSIONS
ANDTHESUBT)REGEXMETHOD
269
THEHACKING
PROGRAM S
MAIN()FUNCTION
270
PARTIALLY
HACKING
THECIPHER
270
BLANKCIPHERLETTER
MAPPINGS
272
ADDING
LETTERSTOACIPHERLETTER
MAPPING
272
INTERSECTING
TWOLETTERMAPPINGS
274
REMOVING
SOLVEDLETTERS
FROMTHELETTERMAPPING
275
HACKING
THESIMPLESUBSTITUTION
CIPHER
277
CREATING
AKEYFROMALETTERMAPPING
280
COULDN T
WEJUSTENCRYPT
THESPACESTOO?
282
SUMMARY
282
CHAPTER
19
*THEVIGENERE
CIPHER
283
LECHIFFRE
INDCCHIFFRABLE
284
MULTIPLE
KEYS
INTHEVIGENERE
KEY
284
SOURCECODEOFVIGENERECIPHERPROGRAM
287
SAMPLERUNOFTHEVIGENERE
CIPHERPROGRAM
290
HOWTHEPROGRAM
WORKS
290
SUMMARY
294
CHAPTER
20
*FREQUENCY
ANALYSIS
295
THECODEFORMATCHING
LETTERFREQUENCIES
300
HOWTHEPROGRAM
WORKS
302
THEMOSTCOMMON
LETTERS, ETAOIN
303
THEPROGRAM S
GETLET
TERSCOUNT
()FUNCTION
303
THEPROGRAM S
GETLTEMATLNDEXZERO
()FUNCTION
304
THEPROGRAM S GETFREQUENCYORDER ()FUNCTION
304
THESORT
()METHOD S
KEYANDREVERSE
KEYWORD
ARGUMENTS
306
PASSING
FUNCTIONS
ASVALUES
307
CONVERTING
DICTIONARIES
TOLISTSWITHTHEKEYST),
VALUEST),
ITEMST)
DICTIONARY
METHODS
309
SORTING
THEITEMSFROMADICTIONARY
310
THEPROGRAM S
ENGLISHFREQMATCHSCORE
()FUNCTION
311
SUMMARY
312
CHAPTER
21-
HACKING
THEVIGENERE
CIPHER
313
THEDICTIONARY
ATTACK
314
SOURCECODEFORAVIGENERE
DICTIONARY
ATTACKPROGRAM
314
SAMPLE
RUNOFTHEVIGENERE
DICTIONARY
HACKER
PROGRAM
315
THEREADL
INES
()FILEOBJECT
METHOD
316
THEBABBAGE
ATTACK
&
KASISKI
EXAMINATION
316
KASISKI
EXAMINATION,
STEP
1-
FINDREPEAT
SEQUENCES
SPACINGS
316
KASISKI
EXAMINATION,
STEP2-
GETFACTORS
OFSPACINGS
317
GETEVERYNTHLETTERS
FROMASTRING
318
FREQUENCY
ANALYSIS
318
BRUTE-FORCE
THROUGH
THEPOSSIBLE
KEYS
320
SOURCECODEFORTHEVIGENERE
HACKING
PROGRAM
321
SAMPLE
RUNOFTHEVIGENERE
HACKING
PROGRAM
327
HOWTHEPROGRAM
WORKS
329
FINDING
REPEATED
SEQUENCES
330
CALCULATING
FACTORS
332
REMOVING
DUPLICATES
WITHTHESEN)
FUNCTION
333
THEKASISKI
EXAMINATION
ALGORITHM
336
THEEXTEND
()LISTMETHOD
336
THEENDKEYWORD
ARGUMENT
FORPRINT
()
342
THEITERTOOLS
.PRODUCT
()FUNCTION
:
343
THEBREAK
STATEMENT
347
PRACTICE
EXERCISES,
CHAPTER
21,SETA
348
MODIFYING
THECONSTANTS
OFTHEHACKING
PROGRAM
349
SUMMARY
350
CHAPTER
22
-THEONE-TIME
PADCIPHER
351
THEUNBREAKABLE
ONE-TIME
PADCIPHER
352
WHYTHEONE-TIME PADISUNBREAKABLE
352
BEWAREPSEUDORANDOMNESS
353
BEWARE
THETWO-TIME
PAD
353
THETWO-TIME
PADISTHEVIGENERE
CIPHER
354
PRACTICE
EXERCISES,
CHAPTER
22,SETA
355
SUMMARY
355
CHAPTER
23
-FINDING
PRIME
NUMBERS
356
PRIMENUMBERS
357
COMPOSITE
NUMBERS
358
SOURCECODEFORTHEPRIMESIEVEMODULE
358
HOWTHEPROGRAM
WORKS
359
HOWTOCALCULATE
IFANUMBER
ISPRIME
360
THESIEVEOFERATOSTHENES
361
THEPRIMESIEVE
()FUNCTION
363
DETECTING
PRIMENUMBERS
364
SOURCECODEFORTHERABIN-MILLER
MODULE
365
SAMPLERUNOFTHERABINMILLERMODULE
367
HOWTHEPROGRAM
WORKS
367
THERABIN-MILLER
PRIMALITY
ALGORITHM
367
THENEWANDIMPROVED
ISPRIME
()FUNCTION
368
SUMMARY
370
CHAPTER
24
-PUBLICKEYCRYPTOGRAPHY
ANDTHE
RSACIPHER
372
PUBLIC
KEYCRYPTOGRAPHY
373
THEDANGERS
OF, TEXTBOOK
RSA
375
ANOTEABOUTAUTHENTICATION
375
THEMAN-IN-THE-MIDDLE
ATTACK
376
GENERATING
PUBLICANDPRIVATE
KEYS
377
SOURCECODEFORTHERSAKEYGENERATION
PROGRAM
377
SAMPLERUNOFTHERSAKEYGENERATION
PROGRAM
379
HOWTHEKEYGENERATION
PROGRAM
WORKS
380
THEPROGRAM S
GENERATEKEY
()FUNCTION
381
RSAKEYFILEFORMAT
383
HYBRIDCRYPTOSYSTEMS
384
SOURCECODEFORTHERSACIPHERPROGRAM
385
SAMPLE RUNOFTHERSACIPHER PROGRAM
389
PRACTICE
EXERCISES,
CHAPTER
24,SETA
390
DIGITAL
SIGNATURES
391
HOWTHERSACIPHER
PROGRAM
WORKS
392
ASCII:
USINGNUMBERS
TOREPRESENT
CHARACTERS
394
THECHR
()ANDORD
()FUNCTIONS
394
PRACTICE
EXERCISES,
CHAPTER
24,SETB
395
BLOCKS
395
CONVERTING
STRINGSTOBLOCKSWITH
GETBLOCKSFROMTEXT
()
398
THEENCODE
()
STRINGMETHOD
ANDTHEBYTESDATATYPE
399
THEBYTES
()FUNCTION
ANDDECODE
()BYTESMETHOD
399
PRACTICE
EXERCISES,
CHAPTER
24,SETC
400
BACKTOTHECODE
400
THEMIN()ANDMAX()FUNCTIONS
401
THE
INSERT
()LISTMETHOD
404
THEMATHEMATICS
OFRSA
ENCRYPTING
ANDDECRYPTING
405
THE
POW()
FUNCTION
405
READING
INTHEPUBLIC
&
PRIVATE
KEYSFROMTHEIRKEYFILES
407
THEFULLRSAENCRYPTION
PROCESS
407
THEFULLRSADECRYPTION
PROCESS
410
PRACTICE
EXERCISES,
CHAPTER
24,SETD
411
WHYCAN T
WEHACKTHERSACIPHER
412
SUMMARY
414
ABOUTTHEAUTHOR
416
|
any_adam_object | 1 |
author | Sweigart, Al |
author_facet | Sweigart, Al |
author_role | aut |
author_sort | Sweigart, Al |
author_variant | a s as |
building | Verbundindex |
bvnumber | BV041143308 |
classification_rvk | ST 324 |
classification_tum | DAT 465f DAT 366f |
ctrlnum | (OCoLC)856826509 (DE-599)BVBBV041143308 |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01507nam a2200385 c 4500</leader><controlfield tag="001">BV041143308</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130712s2013 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482614374</subfield><subfield code="9">978-1-482614-37-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)856826509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041143308</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 324</subfield><subfield code="0">(DE-625)143660:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 366f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sweigart, Al</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking secret ciphers with Python</subfield><subfield code="b">[a beginner's guide to cryptography and computer programming with Python]</subfield><subfield code="c">by Al Sweigart</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="3"><subfield code="a">Leipzig</subfield><subfield code="b">Amazon Distribution</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">416 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Python</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4434275-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Python</subfield><subfield code="g">Programmiersprache</subfield><subfield code="0">(DE-588)4434275-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026118902&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026118902</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV041143308 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:40:34Z |
institution | BVB |
isbn | 9781482614374 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026118902 |
oclc_num | 856826509 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-188 |
physical | 416 S. Ill., graph. Darst. |
publishDateSearch | 2013 |
publishDateSort | 2013 |
record_format | marc |
spelling | Sweigart, Al Verfasser aut Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] by Al Sweigart 1. ed. Leipzig Amazon Distribution 2013 416 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Python Programmiersprache (DE-588)4434275-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Kryptologie (DE-588)4033329-2 s Python Programmiersprache (DE-588)4434275-5 s DE-604 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026118902&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Sweigart, Al Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] Python Programmiersprache (DE-588)4434275-5 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4434275-5 (DE-588)4033329-2 (DE-588)4123623-3 |
title | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] |
title_auth | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] |
title_exact_search | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] |
title_full | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] by Al Sweigart |
title_fullStr | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] by Al Sweigart |
title_full_unstemmed | Hacking secret ciphers with Python [a beginner's guide to cryptography and computer programming with Python] by Al Sweigart |
title_short | Hacking secret ciphers with Python |
title_sort | hacking secret ciphers with python a beginner s guide to cryptography and computer programming with python |
title_sub | [a beginner's guide to cryptography and computer programming with Python] |
topic | Python Programmiersprache (DE-588)4434275-5 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Python Programmiersprache Kryptologie Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026118902&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sweigartal hackingsecretcipherswithpythonabeginnersguidetocryptographyandcomputerprogrammingwithpython |