Your Cart

Cryptography with Python Tutorial

On Sale
$13.99
$13.99
Added to cart

Cryptography with Python Tutorial


Modern cryptography is the one used widely among computer science projects to secure the data messages. This tutorial covers the basic concepts of cryptography and its implementation in Python scripting language. After completing this tutorial, you will be able to relate the basic techniques of cryptography in real world scenarios.

This tutorial is meant for the end users who aspire to learn the basics of cryptography and its implementation in real world projects. This tutorial is also useful for networking professionals as well as hackers who want to implement new frameworks instead of following a traditional approach.

Throughout this tutorial, you will learn the basics of cryptography, algorithm description and its implementation in Python. This tutorial is designed with an assumption that the user has an understanding on the basics of cryptography and algorithms. If you are a beginner to these topics, we suggest you to go through tutorials related to them, before you start with this tutorial. 

Table of Contents

  1. Cryptography with Python - Overview
  2. Double Strength Encryption
  3. Python Overview and Installation
  4. Cryptography with Python - Reverse Cipher
  5. Cryptography with Python - Caesar Cipher
  6. Cryptography with Python - ROT13 Algorithm
  7. Transposition Cipher
  8. Encryption of Transposition Cipher
  9. Decryption of Transposition Cipher
  10. Encryption of files
  11. Decryption of files
  12. Base64 Encoding and Decoding
  13. Cryptography with Python - XOR Process
  14. Multiplicative Cipher
  15. Cryptography with Python - Affine Cipher
  16. Hacking Monoalphabetic Cipher
  17. Simple Substitution Cipher
  18. Testing of Simple Substitution Cipher
  19. Decryption of Simple Substitution Cipher
  20. Python Modules of Cryptography
  21. Understanding Vignere Cipher
  22. Implementing Vignere Cipher
  23. One Time Pad Cipher
  24. Implementation of One Time Pad Cipher
  25. Symmetric and Asymmetric Cryptography
  26. Understanding RSA Algorithm
  27. Creating RSA Keys
  28. RSA Cipher Encryption
  29. RSA Cipher Decryption
  30. Hacking RSA Cipher
You will get a PDF (2MB) file