Cryptography using Python

Cryptography using Python
Cryptography using Python
English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 5 Hours | 1.77 GB

Through this training we shall learn various encryption methods, and attack them

Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. Through this training we shall learn various encryption methods, and attack them.

The training will include the following:

  • Cryptography Concepts
  • Understanding Python
  • Installation of Python
  • Strings and writing programs
  • Reverse Cipher
  • Caeser Cipher
  • Brute Force Technique
  • Transposition Cipher
  • Sample program
  • Encrypting and Decryption files
  • Affine Cipher
  • Simple substitution cipher
  • One time pad cipher
  • Finding Prime Numbers
  • Public key cryptography
  • RSA Cipher
Table of Contents

Introduction
1 Introduction to Cryptography using Python

Getting Started Cryptography using Python
2 Understanding the Process of Cryptography
3 Purpose of Python as a Tool
4 Algorithm on Reverse Cipher

Ceaser Cipher Algorithm and Transposition Cipher
5 Understanding Ceaser Cipher
6 Algorithm on Pyperclip
7 Concept of Brute Force Attack
8 Functions of Transposition Cipher
9 Transposition Cipher Encryption Program

Cipher Decryption Program
10 Decryption of Transposition Cipher
11 Learning the Substitution Cipher
12 Implementing Substitution Cipher
13 Functions of Random Key
14 Runnig Code for Subsitution Cipher
15 Hacking the Substitution Cipher
16 Detecting English Programmatically
17 Output of Dictionary List
18 The Multiplicative Cipher
19 Creating Cryptomath Module
20 Affine Cipher Encryption
21 Understanding the Decrypting Functionality
22 Hacking the Affine Cipher
23 Modifying and Hacking Affline

Hacking Process of Vignere Cipher
24 Concept of Vernam Cipher
25 Understanding the Implementation of Vernam Cipher
26 Implementation of Vignere Cipher
27 Hacking the Vignere Cipher
28 Base64 for Encoding and Decoding
29 Understanding MD5 and SHA Hashes
30 The XOR Type of Encryption

Cryptography Plugin
31 Cracking Passwords using Python
32 Understanding Cryptography Plugin
33 Learning the Pycrypto Plugin
34 Symmetric and Asymmetric Cryptography
35 Understanding Primary Numbers Calculations
36 Rabin Miller Algorithm
37 Public Key Cryptography
38 Concept of RSA Algorithm

Calculating RSA keys
39 Implementation of making RSA Keys
40 Returning the Private Key for Execution

RSA Cipher
41 Creating RSA Algorithm Implementation
42 RSA Algorithm Implementation


Download from Rapidgator

Download from Turbobit