Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

Crypto 101

by Laurens Van Houtven

Crypto 101

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.

Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language.

Forge administrator cookies, recover passwords, and even backdoor your own random number generator.

This open book is licensed under a Creative Commons License (CC BY-NC). You can download Crypto 101 ebook for free in PDF format (16.1 MB).

Table of Contents

 
Building blocks
 
Exclusive or ...
 
Block ciphers
 
Stream ciphers
 
Key exchange
 
Public-key encryption
 
Hash functions
 
Message authentication codes
 
Signature algorithms
 
Key derivation functions
 
Random number generators
 
Complete cryptosystems
 
SSL and TLS
 
OpenPGP and GPG
 
Off-The-Record Messaging (OTR)
 
Appendices
 
Modular arithmetic
 
Elliptic curves
 
Side-channel attacks

Book Details

Title
Crypto 101
Subject
Computer Science
Publisher
Self-publishing
Published
2017
Pages
254
Edition
1
Language
English
PDF Size
16.1 MB
License
CC BY-NC

Related Books

Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical s...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...