07.07.2023 Views

Implementing-cryptography-using-python

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index ■ I–M 281

hashlib module, 28–29

Header + Data Units (HDUs), 195

Hellman, Martin, 162, 224

helper file

creating one for constructing plaintext

communications application, 251–252

modifying of for implementing PKI in

application using RSA certificates,

258–259

modifying of in implementing Diffie-

Hellman key exchange, 266–270

hexdigest, conversion to plaintext, 140–141

hexdigest() method, 204

hexlify module, 140

hidden secret, for incorporating message

hashing, 201

Hill 2x2, 83–87

H(m) (notation in cryptographic protocols),

37

I

IDEA, 36

identity (as group axiom), 106

identity operators, 16

IF statement, 16

image cryptography

AES and block modes of operation, 180–187

applying examples, 186

exploring simple CBC mode example,

185–186

exploring simple ECB mode example,

181–185

file cryptography using Fernet, 175–179

overview, 175–176

steganography, 187–197

using Fernet, 179–180

images

cryptography libraries, 174–175

image cryptography, 175–187

simple image cryptography, 171–174

storing binary file inside, 192–194

storing message inside, 188–191

using cryptography with, 171–197

working with large ones, 195–197

immutable, 24

import command, 28

import math call, 28

in membership operator, 15

indentation, misuse of, 10

index() method, 25

indices

negative index, 22

positive index, 22

infinite one-time pad, 164

infrastructure, 255–256

installing

additional packages, 5–8

Chryptography package, 7–8

IPython, 8

Matplotlib, 5–7

Pip, 5–7

Python, 3–8

testing, 9

Wireshark, 253–254

Integer Counter mode, 162–164

integer factorization, 97

inter-realm authentication, 40

inverse (as group axiom), 106

IPython, 8

is identity operator, 16

is not identity operator, 16

is_prime() function, 103

K

-K A (notation in cryptographic protocols), 37

K A,B (notation in cryptographic protocols), 37

Kerberos protocol, 36, 39–40

Kerckhoffs, Auguste, 61

key distribution problem, 223

key escrow, 33

key exchange, 34

key space, use of term, 49

Known-Plaintext (KPA), 50

Koblitz, Neal, 239

L

lambda functions, 125

length extension attack, 209–210

libraries

bcrypt library, 69

binascii library, 140

configuring your first cryptographic

library, 47

cryptography libraries, 174–175

Fernet library, 175

linear equations, solving systems of,

117–119

linear-feedback register (LPSR), 146

list() function, 25

list sequence type, 20–21, 24, 25

logical operators, 13–14

loops, use of, 17–19

M

(m 1, . . . , m n ) (notation in cryptographic

protocols), 37

MAC encryption, for incorporating message

hashing, 200

macOS, installing Python on, 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!