Cracking codes with Python
Loading...
Date
2018
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
No starch press
Abstract
This book is for those who are curious about encryption, hacking, or cryptography. The ciphers
in this book (except for the public key cipher in Chapters 23 and 24) are all centuries old, but any
laptop has the computational power to hack them. No modern organizations or individuals use these
ciphers anymore, but by learning them, you’ll learn the foundations cryptography was built on and
how hackers can break weak encryption.