Learning Correct Cryptography by Example — Seth James Nielson Christopher K

Learning Correct Cryptography by Example — Seth James Nielson Christopher K

Practical Cryptography in Python Learning Correct Cryptography by Example — Seth James Nielson Christopher K. Monson Practical Cryptography in Python Learning Correct Cryptography by Example Seth James Nielson Christopher K. Monson Practical Cryptography in Python: Learning Correct Cryptography by Example Seth James Nielson Christopher K. Monson Austin, TX, USA Hampstead, MD, USA ISBN-13 (pbk): 978-1-4842-4899-7 ISBN-13 (electronic): 978-1-4842-4900-0 https://doi.org/10.1007/978-1-4842-4900-0 Copyright © 2019 by Seth James Nielson, Christopher K. Monson This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Managing Director, Apress Media LLC: Welmoed Spahr Acquisitions Editor: Susan McDermott Development Editor: Laura Berendson Coordinating Editor: Rita Fernando Cover designed by eStudioCalamar Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer- sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation. For information on translations, please e-mail [email protected], or visit http://www.apress.com/ rights-permissions. Apress titles may be purchased in bulk for academic, corporate, or promotional use. eBook versions and licenses are also available for most titles. For more information, reference our Print and eBook Bulk Sales web page at http://www.apress.com/bulk-sales. Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the book's product page, located at www.apress.com/9781484248997. For more detailed information, please visit http://www.apress.com/source-code. Printed on acid-free paper For Saige, who hopes to be a Computer Scientist like Daddy. —Seth To Mom and Dad, who valued good writing and never settled for less than my best. —Chris Table of Contents About the Authors .................................................................................................... xi About the Technical Reviewer ............................................................................... xiii Introduction .............................................................................................................xv Chapter 1: Cryptography: More Than Secrecy .......................................................... 1 Setting Up Your Python Environment ............................................................................................ 1 Caesar’s Shifty Cipher ................................................................................................................... 3 A Gentle Introduction to Cryptography ........................................................................................ 12 Uses of Cryptography .................................................................................................................. 13 What Could Go Wrong? ............................................................................................................... 14 YANAC: You Are Not A Cryptographer .......................................................................................... 15 “Jump Off This Cliff”—The Internet ........................................................................................... 16 The cryptodoneright.org Project ................................................................................................. 17 Enough Talk, Let’s Sum Up .......................................................................................................... 18 Onward ........................................................................................................................................ 19 Chapter 2: Hashing ................................................................................................. 21 Hash Liberally with hashlib ......................................................................................................... 21 Making a Hash of Education ....................................................................................................... 25 Preimage Resistance ............................................................................................................. 27 Second-Preimage and Collision Resistance .......................................................................... 33 Digestible Hash ........................................................................................................................... 36 Pass Hashwords...Er...Hash Passwords ...................................................................................... 39 Pick Perfect Parameters ........................................................................................................ 44 v TABLE OF CONtENtS Cracking Weak Passwords .......................................................................................................... 45 Proof of Work .............................................................................................................................. 48 Time to Rehash ........................................................................................................................... 52 Chapter 3: Symmetric Encryption: Two Sides, One Key .......................................... 53 Let’s Scramble! ........................................................................................................................... 53 What Is Encryption, Really? ........................................................................................................ 57 AES: A Symmetric Block Cipher .................................................................................................. 58 ECB Is Not for Me ........................................................................................................................ 60 Wanted: Spontaneous Independence .......................................................................................... 70 Not That Blockchain ............................................................................................................... 71 Cross the Streams ................................................................................................................. 86 Key and IV Management ............................................................................................................. 91 Exploiting Malleability ................................................................................................................. 96 Gaze into the Padding ............................................................................................................ 99 Weak Keys, Bad Management .................................................................................................. 107 Other Encryption Algorithms ..................................................................................................... 109 finalize() .................................................................................................................................... 109 Chapter 4: Asymmetric Encryption: Public/Private Keys ..................................... 111 A Tale of Two Keys ..................................................................................................................... 111 Getting Keyed Up ...................................................................................................................... 112 RSA Done Wrong: Part One ....................................................................................................... 114 Stuffing the Outbox ................................................................................................................... 122 What Makes Asymmetric Encryption Different? ....................................................................... 126 Pass the Padding ...................................................................................................................... 128 Deterministic Outputs .......................................................................................................... 129 Chosen

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    380 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us