07.07.2023 Views

Implementing-cryptography-using-python

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction

I initiated my journey into cryptography while studying for my undergrad. Most

of the cryptography concepts I learned were based on what one would need for

their CISSP or Security+ exams. Most of my understanding was at a high level,

and it was difficult to remember the more intricate aspects until cryptography

became a primary focus.

It wasn’t until I started my master’s in cybersecurity that I began applying

cryptographic features within a scripting environment. The concepts in this

book will help you advance your knowledge and experience as you dig deeper

into understanding the use of cryptography in Python.

Over the past few years, several governments have discussed legislation that

will ensure that any form of communication, whether it’s an email, text message, or

video chat, can always be read by the police or intelligence services if they have a

warrant. Governments are putting pressure on technology companies to give them

backdoor access or the keys to the kingdom so that they can keep the country safe.

The fight between lawmakers and encrypted messaging platforms has entered

new territory. Imagine a world where the government has seized the opportunity

to scan every electronic message by government-approved scanning

software. The privacy and security of all users will suffer if law enforcement

agencies achieve their dream of breaking cryptosystems. Proponents of end-toend

encryption, like Microsoft, Facebook, and Google, may lose their campaign

to maintain user security as a priority.

We have all heard of times when it would be beneficial for encrypted data

to magically become readable; this is often related to criminal cases. Should

criminals be allowed to plot their plans in secret? Where does the right to our

privacy start? In reality, there are technical and legal issues with allowing governments

to do this; this of course will be strongly opposed by technology and

xvii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!