07.07.2023 Views

Implementing-cryptography-using-python

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

170 Chapter 5 ■ Stream Ciphers and Block Ciphers

While most stream ciphers are used at the hardware layer, you now understand

how to both create and use the Salsa20, ChaCha20, and Vernam ciphers.

We then turned our focus on block ciphers and the various modes of operations.

We concluded the block cipher exploration by examining which modes

allow block ciphers to operate like stream ciphers. We also explored how to

create a DIY cipher using a Feistel Network. We finished with an introduction

to the Advanced Encryption Standard (AES) cryptosystem. You will explore

more about block mode operations and AES in the next chapter as you learn

to encrypt images.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!