07.07.2023 Views

Implementing-cryptography-using-python

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

280 Index ■ E–H

Diffie, Whitfield, 162, 224

Diffie-Hellman class file, creating,

270–275

Diffie-Hellman key exchange

implementing of, 261–276

overview, 242–245

purpose of, 34

as used by TLS, 33

digest() method, 204

dir(), 28

direct authentication, 35

division / operator, 12

DO (data obfuscation), 69–72

double quote ("), 11

downloading and installing, Python, 3–8

E

ECB mode (formerly Electronic Codebook),

158–159, 180, 181–185

ECC keys, generating, 240–241

Ehrsam, W. F., 159

Electronic Codebook (now ECB mode),

158–159

electronic money, 33

elements, orders of, 107–109

El-Gamal encryption, 235–238

elliptic curve cryptography (ECC)

generating ECC keys, 240–241

key lengths and curves, 241–242

overview, 238–240

elliptic curves, 238–239

Ellis, James, 225

else loop, 18–19

ENC algorithm, 2

encode() methods, 71

encoding matrix, 117

Encrypt and Authenticate, 210–211

Encrypt Then Authenticate, 211

encryption

constructing BLOB encryption with RSA

certificates, 232–235

constructing simple text encryption with

RSA certificates, 231–232

El-Gamal encryption, 235–238

MAC encryption, 200–201

symmetric encryption, 8, 36, 39, 49, 176,

215–218

encryption key (K), 2

encryption protocols, as another name for

cryptographic protocols, 32

entity authentication, 35

eSTREAM, 145

Euler’s theorem, 100, 111–114

exponent ** operator, 12

extend() method, 24

F

FA (frequency analysis), 48–49, 120–123

FCS (Frame Check Sequence), 58–59

Federal Information Processing Standards

Publication (FIPS PUB 180-4), 205

Feistel cipher/Feistel network, 165–166

Ferguson, Niels, 162

Fermat’s little theorem, 100, 110–111

Fernet

file cryptography using, 175–179

image cryptography using, 179–180

Fernet library, 175

file operations, 19

files

decryption of using AES, 169

downloading using Python, 27–28

encryption of using AES, 169

use of, 19

FIPS PUB 180-4 (Federal Information

Processing Standards Publication),

205

Flexible Image Transport System (FITS), 3,

195–197

floor division// operator, 12

for loop, 17

forgeries, crafting of, 209–210

forward secrecy (FS), 60

Frame Check Sequence (FCS), 58–59

frequency, determination of, 126–129

frequency analysis (FA), 48–49, 120–123

functions, custom functions, 26–27

G

GEN algorithm, 2

greatest common divisor (GCD), 96–97,

111

group axioms, 106

group law, 106

group theory

orders of elements, 107–109

overview, 106–107

groups, concept of, 106

H

hash code, 67

hash function, 58

Hash-based Message Authentication Code

(HMAC)

binary digests, 204–205

CBC-MAC, 206–207

described, 60

message digest with SHA, 203–204

overview, 201–202

using HMAC to sign message, 202–203

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!