07.07.2023 Views

Implementing-cryptography-using-python

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index ■ D–D 279

CIA Triad, 35–36

cipher block chaining message

authentication code (CBC-MAC), 206–207

Cipher Block Chaining (now CBC mode),

159–160

Cipher Feedback mode (CFB), 160–162

cipher space, use of term, 49

ciphers

Affine cipher, 90–93

ARC4 (ARCFOUR), 147–148

Atbash cipher, 77

block ciphers, 156–169

Caesar cipher, 74–76

ChaCha cipher, 151–156

column transposition, 87–90

Hill 2x2, 83–87

historical ones, 72–93

Playfair, 79–82

ROT-13, 76

Salsa20 cipher, 149–151

stream ciphers, 141–156

substitution ones, 73–77

Vernam cipher, 148–149

Vignère cipher, 77–79, 129–137

ciphertext (C)C, 2

Ciphertext Only (COA), 49

classical cryptography

data obfuscation (DO), 69–72

historical ciphers, 72–93

password best practices, 66–69

client

creating one for constructing plaintext

communications application, 250–251

modifying of for implementing PKI in

application using RSA certificates, 257

client file, modifying of in implementing

Diffie-Hellman key exchange, 264–266

client socket, creating, 213–214

clock synchronization, 42

closure (as group axiom), 106

Cocks, Clifford (mathematician and

cryptographer), 224–226

codes

commenting on, 10

message authentication codes, 60

collision resistance, 59

column transposition, 87–90

comments, on code, 10

“Communication Theory and Secrecy

Systems” (Shannon), 50

comparison operators, 13

Composer, Pip as similar to, 5

concatenate message and MAC, for

incorporating message hashing, 200

conditionals, use of, 16–17

continue loop, 18

count() method, 25

CPA (Chosen-Plaintext), 50

cryptanalysis

defined, 47

with Python, 123–137

understanding of, 47–49

cryptographic family, 33–34

cryptographic library, configuring your first,

47

cryptographic one-way hashes, 59–60

cryptographic protocols, 32–33, 46–47. See

also specific protocols

cryptographically secure pseudorandom

number generator (CSPRNG), 115,

141–144, 146

cryptography

history of, 31, 242

origin of term, 32

study of, 32–49

understanding of, 32–47

Cryptography library, 174–175, 189

Cryptography package, installing, 7–8

Cryptosteganography library, 175

cryptosteganography module, 175, 188,

189, 192

CTR (counter) style, 157

CTR mode (Integer Counter mode or

Segmented Integer Counter mode),

162–164

custom functions, 26–27

D

data

binary data, 71

obfuscating of, 69–72

data obfuscation (DO), 69–72

data origin authentication, 34–35

De Cannière, Christophe, 145

De Vita Caesarum, Divus Iulis ("The Lives of

the Caesars, the Deified Julius"

commonly known as The Twelve

Caesars), 74–76

DEC algorithm, 2

decode() method, 71

decoding, 71

decryption

Authenticate Then Decrypt, 211

constructing BLOB decryption with RSA

certificates, 232–235

constructing simple text decryption with

RSA certificates, 231–232

of files using AES, 169

def keyword, 26

DES, 36, 156

deterministic algorithm, 101

dictionaries, 25–26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!