07.07.2023 Views

Implementing-cryptography-using-python

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER

3

Classical Cryptography

Authentication protocols need to employ encryption to protect the session from

exposure to intruders; over the past few years, we have heard time and time

again of data breaches that have left user data vulnerable and passwords in the

hands of bad actors. In a secure world, passwords are typically hashed, salted,

and stretched, and electronic communications should be encrypted to ensure

secrecy. Just hashing or encrypting data may not be enough, though. The best

encryption schemes will not protect data from poorly constructed passwords. In

this chapter, you’ll be introduced to password practices, get an understanding

of some common historical cryptography schemes, and learn the Python code

that will bring all the topics together. Specifically, you will gain cryptographic

knowledge as you do the following:

■■

Explore best practices for passwords

■■

Explore the basics of encryption schemes

■■

Explore the use of historical ciphers and their cryptanalysis

■■

Gain an understanding of why it is critical to use well-established

encryption algorithms

Implementing Cryptography Using Python®, First Edition. Shannon W. Bray.

© 2020 John Wiley & Sons, Inc. Published 2020 by John Wiley & Sons, Inc.

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!