Crypto 101

by Laurens Van Houtven

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.

Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language.

Forge administrator cookies, recover passwords, and even backdoor your own random number generator.

This open book is licensed under a Creative Commons License (CC BY-NC). You can download Crypto 101 ebook for free in PDF format (16.1 MB).

Table of Contents

 
Building blocks
 
Exclusive or ...
 
Block ciphers
 
Stream ciphers
 
Key exchange
 
Public-key encryption
 
Hash functions
 
Message authentication codes
 
Signature algorithms
 
Key derivation functions
 
Random number generators
 
Complete cryptosystems
 
SSL and TLS
 
OpenPGP and GPG
 
Off-The-Record Messaging (OTR)
 
Appendices
 
Modular arithmetic
 
Elliptic curves
 
Side-channel attacks
 

Book Details

Subject
Computer Science
Publisher
Self-publishing
Published
2017
Pages
254
Edition
1
Language
English
PDF Size
16.1 MB
License
CC BY-NC

Related Books

Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...