Crypto 101

by Laurens Van Houtven

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.

Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language.

Forge administrator cookies, recover passwords, and even backdoor your own random number generator.

This open book is licensed under a Creative Commons License (CC BY-NC). You can download Crypto 101 ebook for free in PDF format (16.1 MB).

Table of Contents

Building blocks
Exclusive or ...
Block ciphers
Stream ciphers
Key exchange
Public-key encryption
Hash functions
Message authentication codes
Signature algorithms
Key derivation functions
Random number generators
Complete cryptosystems
OpenPGP and GPG
Off-The-Record Messaging (OTR)
Modular arithmetic
Elliptic curves
Side-channel attacks

Book Details

Computer Science
PDF Size
16.1 MB

Related Books

Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about en...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...