Implementing cryptography using python / (Record no. 6370)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06739nam a22002655i 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240112130941.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200610s2020 inu 000 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119612209 |
Qualifying information | (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119612223 |
Qualifying information | (adobe pdf) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BUL |
Transcribing agency | BUL |
Modifying agency | BUL |
Language of cataloging | eng |
Description conventions | rda |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.824 |
Item number | BRA |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bray, Shannon. |
245 10 - TITLE STATEMENT | |
Title | Implementing cryptography using python / |
Statement of responsibility, etc. | Shannon Bray. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st edition |
263 ## - PROJECTED PUBLICATION DATE | |
Projected publication date | 2007 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis : |
Name of producer, publisher, distributor, manufacturer | John Wiley and Sons, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 284 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm |
500 ## - GENERAL NOTE | |
General note | Contents<br/><br/>Chapter 1 Introduction to Cryptography and Python <br/><br/>Exploring Algorithms <br/><br/>Why Use Python? <br/><br/>Downloading and Installing Python <br/><br/>Installing on Ubuntu <br/><br/>Installing on macOS <br/><br/>Installing on Windows <br/><br/>Installing on a Chromebook <br/><br/>Installing Additional Packages <br/><br/>Installing Pip, NumPy, and Matplotlib <br/><br/>Installing the Cryptography Package <br/><br/>Installing Additional Packages <br/><br/>Testing Your Install <br/><br/>Diving into Python Basics <br/><br/>Using Variables <br/><br/>Using Strings <br/><br/>Introducing Operators <br/><br/>Understanding Arithmetic Operators <br/><br/>Understanding Comparison Operators <br/><br/>Understanding Logical Operators <br/><br/>Understanding Assignment Operators <br/><br/>Understanding Bitwise Operators <br/><br/>Understanding Membership Operators <br/><br/>Understanding Identity Operators <br/><br/>Using Conditionals <br/><br/>Using Loops <br/><br/>for <br/><br/>while <br/><br/>continue <br/><br/>break <br/><br/>else <br/><br/>Using Files <br/><br/>Understanding Python Semantics <br/><br/>Sequence Types <br/><br/>Introducing Custom Functions <br/><br/>Downloading Files Using Python <br/><br/>Introducing Python Modules <br/><br/>Creating a Reverse Cipher <br/><br/>Summary <br/><br/><br/>Chapter 2 Cryptographic Protocols and Perfect Secrecy<br/><br/>The Study of Cryptology <br/><br/>Understanding Cryptography <br/><br/>Cryptography’s Famous Family: Alice and Bob <br/><br/>Diffie-Hellman <br/><br/>Data Origin Authentication <br/><br/>Entity Authentication <br/><br/>Symmetric Algorithms <br/><br/>Asymmetric Algorithms <br/><br/>The Needham-Schroeder Protocols <br/><br/>The Otway-Rees Protocol <br/><br/>Kerberos <br/><br/>Multiple-Domain Kerberos <br/><br/>X.509 <br/><br/>Formal Validation of Cryptographic Protocols <br/><br/>Configuring Your First Cryptographic Library <br/><br/>Understanding Cryptanalysis <br/><br/>Brute-Force Attacks <br/><br/>Side-Channel Attacks <br/><br/>Social Engineering <br/><br/>Analytical Attacks <br/><br/>Frequency Analysis <br/><br/>Attack Models <br/><br/>Shannon’s Theorem <br/><br/>One-Time Pad <br/><br/>XOR, AND, and OR <br/><br/>One-Time Pad Function <br/><br/>One-Way Hashes <br/><br/>Cryptographic One-Way Hashes <br/><br/>Message Authentication Codes <br/><br/>Perfect Forward Secrecy <br/><br/>Published and Proprietary Encryption Algorithms <br/><br/>Summary <br/><br/>References <br/><br/><br/>Chapter 3 Classical Cryptography <br/><br/>Password Best Practices <br/><br/>Password Storage <br/><br/>Hashing Passwords <br/><br/>Salting Passwords<br/><br/>Stretching Passwords <br/><br/>Password Tools<br/><br/>Obfuscating Data <br/><br/>ASCII Encoding <br/><br/>Base64 Encoding Text <br/><br/>Binary Data <br/><br/>Decoding <br/><br/>Historical Ciphers <br/><br/>Scytale of Sparta <br/><br/>Substitution Ciphers <br/><br/>Caesar Cipher <br/><br/>ROT-13 <br/><br/>Atbash Cipher <br/><br/>Vigenère Cipher <br/><br/>Playfair <br/><br/>Hill 2x2 <br/><br/>Column Transposition <br/><br/>Affine Cipher <br/><br/>Summary <br/><br/><br/>Chapter 4 Cryptographic Math and Frequency Analysis<br/><br/>Modular Arithmetic and the Greatest Common Devisor <br/><br/>Prime Numbers <br/><br/>Prime Number Theorem <br/><br/>School Primality Test <br/><br/>Fermat’s Little Theorem <br/><br/>Miller-Rabin Primality Test <br/><br/>Generate Large Prime Numbers <br/><br/>Basic Group Theory <br/><br/>Orders of Elements <br/><br/>Modular Inverses <br/><br/>Fermat’s Little Theorem to Find the Inverse <br/><br/>Extending the GCD <br/><br/>Euler’s Theorem <br/><br/>Pseudorandomness <br/><br/>Breaking C’s rand() Function <br/><br/>Solving Systems of Linear Equations <br/><br/>Frequency Analysis <br/><br/>Cryptanalysis with Python <br/><br/>Using an Online Word List <br/><br/>Determining the Frequency <br/><br/>Breaking the Vigenère Cipher <br/><br/>Summary <br/><br/><br/>Chapter 5 Stream Ciphers and Block Ciphers <br/><br/>Convert between Hexdigest and Plaintext <br/><br/>Use Stream Ciphers <br/><br/>ARC4 <br/><br/>Vernam Cipher <br/><br/>Salsa20 Cipher <br/><br/>ChaCha Cipher <br/><br/>Use Block Ciphers <br/><br/>Block Modes of Operations <br/><br/>ECB Mode <br/><br/>CBC Mode <br/><br/>CFB Mode <br/><br/>OFB Mode <br/><br/>CTR Mode <br/><br/>Tricks with Stream Modes <br/><br/>DIY Block Cipher Using Feistel Networks <br/><br/>Advanced Encryption Standard (AES) <br/><br/>Using AES with Python <br/><br/>File Encryption Using AES <br/><br/>File Decryption Using AES <br/><br/>Summary <br/><br/><br/>Chapter 6 Using Cryptography with Images <br/><br/>Simple Image Cryptography <br/><br/>Images and Cryptography Libraries <br/><br/>Understanding the Cryptography Library <br/><br/>Understanding the Cryptosteganography Library<br/><br/>Image Cryptography <br/><br/>File Cryptography Using Fernet <br/><br/>Image Cryptography Using Fernet <br/><br/>AES and Block Modes of Operations <br/><br/>Exploring a Simple ECB Mode Example <br/><br/>Exploring a Simple CBC Mode Example<br/><br/>Applying the Examples <br/><br/>Steganography <br/><br/>Storing a Message Inside an Image <br/><br/>Storing a Binary File Inside an Image <br/><br/>Working with large images <br/><br/>Summary <br/><br/><br/>Chapter 7 Message Integrity <br/><br/>Message Authentication Codes <br/><br/>Hash-based Message Authentication Code <br/><br/>Using HMAC to Sign Message <br/><br/>Message Digest with SHA <br/><br/>Binary Digests <br/><br/>NIST Compliance <br/><br/>CBC-MAC <br/><br/>Birthday Attacks <br/><br/>Crafting Forgeries <br/><br/>The Length Extension Attack <br/><br/>Setting Up a Secure Channel <br/><br/>Communication Channels <br/><br/>Sending Secure Messages over IP Networks <br/><br/>Create a Server Socket <br/><br/>Create a Client Socket <br/><br/>Create a Threaded Server with TCP <br/><br/>Adding Symmetric Encryption <br/><br/>Concatenate Message and MAC <br/><br/>Summary <br/><br/>References <br/><br/><br/>Chapter 8 Cryptographic Applications and PKI <br/><br/>The Public-Key Transformation <br/><br/>Exploring the Basics of RSA <br/><br/>Generating RSA Certificates <br/><br/>Constructing Simple Text Encryption and Decryption with RSA Certificates <br/><br/>Constructing BLOB Encryption and<br/><br/>Decryption with RSA Certificates <br/><br/>The El-Gamal Cryptosystem <br/><br/>Elliptic Curve Cryptography <br/><br/>Generating ECC Keys <br/><br/>Key Lengths and Curves <br/><br/>Diffie-Hellman Key Exchange <br/><br/>Summary <br/><br/><br/>Chapter 9 Mastering Cryptography Using Python <br/><br/>Constructing a Plaintext Communications Application <br/><br/>Creating a Server <br/><br/>Creating the Client <br/><br/>Creating the Helper File <br/><br/>Execution <br/><br/>Installing and Testing Wireshark <br/><br/>Implementing PKI in the Application Using RSA Certificates <br/><br/>Modifying the Server <br/><br/>Modifying the Client <br/><br/>Modifying the Helper File <br/><br/>Execution <br/><br/>Implementing Diffie-Hellman Key Exchange <br/><br/>Modifying the Server File <br/><br/>Modifying the Client File <br/><br/>Modifying the Helper File <br/><br/>Creating the Diffie-Hellman Class File <br/><br/>Execution <br/><br/>Wrapping Up |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data Encryption |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book Closed Access |
Classification part | 005.824 |
Item part | 1 |
Call number prefix | BRA |
Call number suffix | 005.824 BRA |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Engineering Library | Engineering Library | 09/22/2021 | Purchase | 0027607 | 005.824 BRA 1 | BUML24010295 | 09/22/2021 | 1 | 09/22/2021 | Book Closed Access |