• Complain

Seth James Nielson - Practical Cryptography in Python: Learning Correct Cryptography by Example

Here you can read online Seth James Nielson - Practical Cryptography in Python: Learning Correct Cryptography by Example full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Seth James Nielson Practical Cryptography in Python: Learning Correct Cryptography by Example

Practical Cryptography in Python: Learning Correct Cryptography by Example: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Practical Cryptography in Python: Learning Correct Cryptography by Example" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.
Cryptography is the life blood of the digital worlds security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.
Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how bad cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesnt, and why.


What Youll Learn
Understand where cryptography is used, why, and how it gets misused
Know what secure hashing is used for and its basic properties
Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break
Use message integrity and/or digital signatures to protect messages
Utilize modern symmetric ciphers such as AES-GCM and CHACHA
Practice the basics of public key cryptography, including ECDSA signatures
Discover how RSA encryption can be broken if insecure padding is used
Employ TLS connections for secure communications
Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs



Who This Book Is For
IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.

Seth James Nielson: author's other books


Who wrote Practical Cryptography in Python: Learning Correct Cryptography by Example? Find out the surname, the name of the author of the book and a list of all author's works by series.

Practical Cryptography in Python: Learning Correct Cryptography by Example — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Practical Cryptography in Python: Learning Correct Cryptography by Example" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Seth James Nielson and Christopher K Monson Practical Cryptography in Python - photo 1
Seth James Nielson and Christopher K. Monson
Practical Cryptography in Python
Learning Correct Cryptography by Example
Seth James Nielson Austin TX USA Christopher K Monson Hampstead MD USA - photo 2
Seth James Nielson
Austin, TX, USA
Christopher K. Monson
Hampstead, MD, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484248997 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-4899-7 e-ISBN 978-1-4842-4900-0
https://doi.org/10.1007/978-1-4842-4900-0
Seth James Nielson, Christopher K. Monson 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

For Saige, who hopes to be a Computer Scientist like Daddy.

Seth

To Mom and Dad, who valued good writing and never settled for less than my best.

Chris

Introduction

The interconnected world of the current era has drastically changed everything, including banking, entertainment, and even statecraft. Despite differences in users, purposes, and security profiles, these digital applications have at least one thing in common: they all require properly applied cryptography to work correctly.

Informally, cryptography is the mathematics of secrets. We need secret codes to make messages unreadable to unauthorized eyes, to make messages unchangeable, and to know who sent the message. Practical cryptography is the design and use of these codes in real systems.

This book is primarily for computer programmers with little or no previous background with cryptography. Although mathematics makes brief appearances in the book, the overall approach is to teach introductory cryptography concepts by example.

Our journey begins with some introductory components, including hashing algorithms, symmetric encryption, and asymmetric encryption. Next, we go beyond encryption and into the realm of digital certificates, signatures, and message authentication codes. The final chapters show how these various elements come together in interesting and useful combinations, such as Kerberos and TLS.

Another important part of cryptography by example is cryptography by bad example! In this book we will break things on purpose to help the reader appreciate what motivates accepted best practices. Exercises and examples include walk-throughs of real vulnerabilities that have afflicted the Internet. The bad examples will help the reader gain a greater intuition of what goes wrong in cryptography and why.

Table of Contents
About the Authors and About the Technical Reviewer
About the Authors
Seth James Nielson
is the Founder and Chief Scientist of Crimson Vista Inc a boutique computer - photo 3

is the Founder and Chief Scientist of Crimson Vista, Inc., a boutique computer security research and consulting company. He is also an adjunct professor at Johns Hopkins University where he teaches network security and has also served as the Director of Advanced Research Projects in the Information Security Institute. As part of his Hopkins work, he co-founded the https://cryptodoneright.org knowledge base, through a generous grant from Cisco.

Christopher K. Monson
has a PhD in machine learning and has spent over a decade at Google in various - photo 4

has a PhD in machine learning and has spent over a decade at Google in various engineering, machine learning, and leadership roles. He has broad experience writing and teaching programming courses in multiple languages and has worked in document password recovery, malware detection, and large-scale secure computing. He is serving as the Chief Technology Officer at Data Machines Corp. and teaches Cloud Computing Security at the Johns Hopkins University Information Security Institute.

About the Technical Reviewer
Mike Ounsworth
is a Software Security Architect at Entrust Datacard He holds an undergraduate - photo 5

is a Software Security Architect at Entrust Datacard. He holds an undergraduate degree in computer science with concentrations in mathematics and physics and an MSc in computer science in robotics and artificial intelligence. Professionally, his day job is mainly application security architecture and penetration testing, with some research side projects in cryptography and post-quantum cryptography. Outside of work, he mentors teams competing in the high-school-age FIRST Robotics Competition.

Seth James Nielson, Christopher K. Monson 2019
S. J. Nielson, C. K. Monson Practical Cryptography in Python https://doi.org/10.1007/978-1-4842-4900-0_1
1. Cryptography: More Than Secrecy
Seth James Nielson
(1)
Austin, TX, USA
(2)
Hampstead, MD, USA

Welcome to the world of practical cryptography! The intent of this book is to teach you enough about cryptography that you can reason about what it does, when certain types can be effectively applied, and how to choose good strategies and algorithms. There are examples and exercises throughout each chapter, usually with a follow-along exercise right at the beginning to help you get your bearings. These examples are often accompanied by some fictitious stage setting to add some context. After youve had some exposure and experience, the technical terms that follow those examples should make more sense and be more memorable. We hope you like it.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Practical Cryptography in Python: Learning Correct Cryptography by Example»

Look at similar books to Practical Cryptography in Python: Learning Correct Cryptography by Example. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Practical Cryptography in Python: Learning Correct Cryptography by Example»

Discussion, reviews of the book Practical Cryptography in Python: Learning Correct Cryptography by Example and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.