img Leseprobe Leseprobe

Hands-on Cryptography with Python

Master Cryptographic Foundations with Real-World Implementation for Secure System Development Using Python

Md Rasid Ali

EPUB
19,49

Orange Education Pvt Ltd img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik, EDV

Beschreibung

Master Cryptography with Python: From History to Real-World Implementation.

Key Features
● Learn by building encryption algorithms and secure systems using Python.
● Master everything from basic ciphers to advanced cryptographic solutions.
● Develop the ability to identify and address vulnerabilities in encryption systems.

Book Description
Cryptography is the backbone of modern digital security, and Python makes it accessible for everyone. Hands-on Cryptography with Python takes readers from foundational concepts to advanced cryptographic systems, equipping them with both theoretical understanding and practical implementation skills using Python.

You’ll begin with setting up the platform and Installation and move on to understanding the basics of cryptography—exploring classic ciphers, their evolution, and their role in secure communication. Next, you’ll advance to Symmetric Key Cryptography and Asymmetric Key Cryptography, learning how to implement encryption algorithms step-by-step with Python.

As you progress, you’ll dive into essential cryptographic components like Hashing and Message Integrity, enabling you to safeguard data and verify its authenticity. The book then introduces miscellaneous cryptographic schemes and highlights the principle that “Security is Only as Strong as the Weakest Link”, encouraging you to identify and address vulnerabilities.

Toward the final stages, you’ll gain hands-on expertise in TLS Communication, the backbone of secure data exchange on the web. The journey culminates with an exploration of current trends in cryptography, including lightweight cryptography and post-quantum solutions, ensuring you stay ahead in this ever-evolving field.

What you will learn
● Understand cryptographic techniques from classical to modern approaches.
● Implement symmetric and asymmetric encryption using Python.
● Design secure systems using hashing and authentication protocols.
● Analyze and apply cryptographic algorithms to security challenges.
● Explore lightweight cryptography and post-quantum solutions.
● Integrate cryptography into IoT and resource-constrained devices.

Table of Contents
1. Platform Setup and Installation
2. Introduction to Cryptography
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Hashing
6. Message Integrity
7. Miscellaneous Crypto Schemes
8. Security is Only as Strong as the Weakest Link
9. TLS Communication
10. Latest Trends in Cryptography
       Index

About the Authors
Md Rasid Ali is a seasoned cryptography and security expert specializing in firmware development for resource-constrained devices. Currently a Senior Engineer at Qualcomm Inc., Rasid focuses on Root-of-Trust (RoT) firmware and cryptographic protocol development. Beyond his professional work, he actively collaborates with research institutions on advanced topics such as Lightweight Cryptography and Post-Quantum Cryptography, bridging the gap between industry and academia. His work fosters innovation and contributes to the ongoing evolution of cryptographic technologies.

Rasid holds a Master of Science (by Research) in Computer Science and Engineering from IIT Kharagpur, where his thesis on Cryptography was published in several prestigious journals. His professional career also includes significant contributions as a Junior Project Officer, where he worked for three years on a cryptanalysis-focused project funded by the Ministry of Electronics and Information Technology, Government of India.
 

Weitere Titel von diesem Autor

Kundenbewertungen

Schlagwörter

Post-Quantum Cryptography, Asymmetric Encryption, Cryptography, Cybersecurity, Hash Functions, Secure Communication, Authentication Mechanisms, Elliptic Curve Cryptography (ECC), Encryption Algorithms, Python Programming, Cryptographic Primitives, Digital Signatures, Symmetric Encryption, Lightweight Cryptography, Modern Cryptography, Lattice-Based Cryptography, Data Integrity, Real-Life Implementation