Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

Crypto 101

by Laurens Van Houtven

Crypto 101

Subscribe to new books via telegram channel

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.

Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language.

Forge administrator cookies, recover passwords, and even backdoor your own random number generator.

This open book is licensed under a Creative Commons License (CC BY-NC). You can download Crypto 101 ebook for free in PDF format (16.1 MB).

Table of Contents

Building blocks
Exclusive or ...
Block ciphers
Stream ciphers
Key exchange
Public-key encryption
Hash functions
Message authentication codes
Signature algorithms
Key derivation functions
Random number generators
Complete cryptosystems
OpenPGP and GPG
Off-The-Record Messaging (OTR)
Modular arithmetic
Elliptic curves
Side-channel attacks

Book Details

Crypto 101
Computer Science
PDF Size
16.1 MB

Related Books

Open Workbook of Cryptology
Everyone needs a little cryptology. The problem with crypto is that it has a reputation of being very hard and mysterious, as well as very easy to get wrong. While there are aspects of crypto that are connected to quite modern and complex theories - such as number theory, an old and deep branch of mathematics; complexity theory, a new(er) and su...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical s...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...