Transcribed

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Nov 22, 2024 · 14m 45s
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Description

The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and...

show more
The sources are from a book titled "Hands-On Cryptography with Python" by Samuel Bowne. This book aims to teach readers about cryptography and how to use Python to encrypt and decrypt data. It covers various techniques from classical ciphers like the Caesar cipher and ROT13 to modern encryption algorithms like AES and RSA. The book also explains hashing techniques, including MD5 and SHA, used for file integrity checks and password obfuscation. In addition to providing code examples and challenges, the book explores vulnerabilities like the padding oracle attack and discusses the importance of concepts such as confusion and diffusion in strong encryption methods.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Hands-Cryptography-Python-Leverage-encrypt-ebook/dp/B07F73GW7Y?&linkCode=ll1&tag=cvthunderx-20&linkId=5d997c5aa32cd42a5ac52107f7a7bba5&language=en_US&ref_=as_li_ss_tl
show less
Information
Author CyberSecurity Summary
Organization CyberSecurity Summary
Website -
Tags

Looks like you don't have any active episode

Browse Spreaker Catalogue to discover great new content

Current

Podcast Cover

Looks like you don't have any episodes in your queue

Browse Spreaker Catalogue to discover great new content

Next Up

Episode Cover Episode Cover

It's so quiet here...

Time to discover new episodes!

Discover
Your Library
Search