By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

Course Drive

Download Top Udemy,Lynda,Packtpub and other courses

  • Home
  • Udemy
  • Lynda
  • Others
    • FrontendMasters
    • MasterClass
    • Udacity
  • Request Course
  • Contact Us
Aa

Course Drive

Download Top Udemy,Lynda,Packtpub and other courses

Aa
Have an existing account? Sign In
Follow US
Course Drive > Udemy > IT & Software > Cryptography and Hashing Fundamentals in Python and Java
IT & Software

Cryptography and Hashing Fundamentals in Python and Java

Last updated: 2023/01/26 at 8:36 AM
ADMIN January 26, 2023
Share
4 Min Read
SHARE

Cryptography and Hashing Fundamentals in Python and Java Download

Private and Public Key Cryptosystems, DES, AES, Cryptoanalysis, RSA, Elliptic Curve Cryptography and Hashing Cryptography and Hashing Fundamentals in Python and Java

What you’ll learn

  • Understand the basics of private key encryption systems
  • Caesar cipher and Vigenere cipher
  • Frequency analysis and the Kasiski algorithm
  • One Time Pad (OTP) and Shannon secrecy
  • Random and pseudo-random numbers
  • Data Encryption Standard (DES) and Advanced Encryption Standard (AES)
  • Understand the basics of public key encryption systems
  • RSA and Diffie-Hellman key exchange algorithm
  • Elliptic Curve Cryptography
  • Modular arithmetic basics (Fermat’s theorem, finding primes, integer factorization and discrete logarithm)
  • Euclidean algorithm (greatest common divisor problem) and the extended Euclidean algorithm
  • Understand hashing (MD5 and SHA)

Requirements

  • You should have an interest in cryptography as well as some programming knowledge in Python or Java!

Description

In this course you will learn about cryptography and hashing in Python and Java as well. You will understand most of the private key (symmetric) and pubic key (asymmetric) cryptosystems on a step by step basis. You can learn about the theory as well as the implementation for every cryptographic algorithm – and how to crack these systems (so what are the weaknesses).

Chapter 1 – Cryptography Fundamentals

  • what is the aim of cryptography?

  • private key and public key cryptosystems

Chapter 2 – Caesar Cipher

  • Caesar cipher theory and implementation

  • how to crack Caesar cipher

  • frequency analysis and language detection

Chapter 3 – Vigenere Cipher

  • Vigenere cipher theory and implementation

  • how to crack Vigenere cipher with Kasiski-algorithm

Chapter 4 – One Time Pad (Vernam Cipher)

  • random and pseudo-random numbers

  • the XOR logical operator

  • one time pad theory and implementation

  • why is it impossible to crack Vernam cipher?

  • Shannon’s secrecy

Chapter 5 – Data Encryption Standard (DES)

  • data encryption standard (DES) theory and implementation

  • cryptoanalysis techniques

  • linear cryptoanalysis and differential cryptoanalysis

Chapter 6 – Advanced Encryption Standard (AES)

  • advanced encryption standard (AES) theory and implementation

  • Shannon’s confusion and diffusion

Chapter 7 – Asymmetric Cryptosystems

  • problems with private key cryptosystems

  • random numbers and prime numbers in cryptography

Chapter 8 – Modular Arithmetic

  • modular arithmetic fundamentals

  • finding prime numbers – naive approach and advanced algorithms

  • integer factorization problem

  • discrete logarithm problem

Chapter 9 – Diffie-Hellman Key Exchange

  • Diffie-Hellman key exchange algorithm theory and implementation

  • prime numbers and primitive roots

  • man-in-the-middle attack

Chapter 10 – RSA Algorithm

  • RSA algorithm theory and implementation

  • the problem of factorization

Chapter 11 – Advanced Modular Arithmetic

  • Euclidean and the greatest common divisor (GCD) problem

  • extended Euclidean algorithm (EGCD)

  • modular inverse problem

Chapter 12 – Elliptic Curve Cryptography (ECC)

  • elliptic curve cryptography theory and implementation

  • why does Bitcoin use elliptic curve cryptography?

Chapter 13 – Cryptographic Hashing

  • what is hashing in cryptography?

  • properties of hashing

  • birthday paradox

  • MD5 and SHA algorithms

Thanks for joining my course, let’s get started!

Who this course is for:

  • Python or Java developers curious about cryptography!
Cryptography and Hashing Fundamentals in Python and Java Free Download

Direct Download (Part 1)  

Direct Download (Part 2)  

Source: https://www.udemy.com/course/learn-cryptography-basics-in-python/
ADMIN January 30, 2023
Share this Article
Facebook Twitter Whatsapp Whatsapp Reddit Telegram Email Copy Link
Previous Article Concurrency, Multithreading and Parallel Computing in Java
Next Article Introduction to Collections, Generics & Reflection in Java
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

IT & Software

Becoming a Cloud Expert – Microsoft Azure IaaS – Level 1

March 25, 2023
IT & Software

Zero to Hero with Azure Virtual Desktop AVD

March 24, 2023
IT & Software

Azure DevOps Fundamentals for Beginners

March 21, 2023
IT & Software

AZ-305 Azure Architect Design Exam Prep (with AZ-304)

March 21, 2023
IT & Software

AZ-900: Microsoft Azure Fundamentals Exam Prep 2023

March 17, 2023
IT & Software

DP-900: Microsoft Azure Data Fundamentals Course – Aug 2022

March 17, 2023
IT & Software

Azure Active Directory Masterclass

March 17, 2023
IT & Software

AZ-204 Developing Solutions for Microsoft Azure

March 16, 2023
Previous Next

Weekly Popular

Azure DevOps Fundamentals for Beginners
IT & Software
Control Excel with Python & OpenPyXL
Business
Zero to Hero with Azure Virtual Desktop AVD
IT & Software
Becoming a Cloud Expert – Microsoft Azure IaaS – Level 1
IT & Software
XPath locators for Selenium
Development

Recent Posts

Angular – The Complete Guide (2023 Edition)
Development
Control Excel with Python & OpenPyXL
Business
Becoming a Cloud Expert – Microsoft Azure IaaS – Level 1
IT & Software
Zero to Hero with Azure Virtual Desktop AVD
IT & Software
XPath locators for Selenium
Development
Follow US

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?