Close Modal

Cracking Codes with Python

An Introduction to Building and Breaking Ciphers

Look inside
Paperback
7.06"W x 9.25"H x 0.95"D   | 28 oz | 18 per carton
On sale Jan 23, 2018 | 416 Pages | 9781593278229
Reading Level: Lexile 1150L
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin.

Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it!

You’ll also learn how to:

- Combine loops, variables, and flow control statements into real working programs
- Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish
- Create test programs to make sure that your code encrypts and decrypts correctly
- Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message
- Break ciphers with techniques such as brute-force and frequency analysis

There’s no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!
Al Sweigart is a professional software developer who teaches programming to kids and adults. He is the author of Automate the Boring Stuff with Python, Invent Your Own Computer Games with Python, and Scratch Programming Playground, also from No Starch Press. His programming tutorials can be found at inventwithpython.com.
Available for sale exclusive:
•     Afghanistan
•     Aland Islands
•     Albania
•     Algeria
•     Andorra
•     Angola
•     Anguilla
•     Antarctica
•     Antigua/Barbuda
•     Argentina
•     Armenia
•     Aruba
•     Australia
•     Austria
•     Azerbaijan
•     Bahamas
•     Bahrain
•     Bangladesh
•     Barbados
•     Belarus
•     Belgium
•     Belize
•     Benin
•     Bermuda
•     Bhutan
•     Bolivia
•     Bonaire, Saba
•     Bosnia Herzeg.
•     Botswana
•     Bouvet Island
•     Brazil
•     Brit.Ind.Oc.Ter
•     Brit.Virgin Is.
•     Brunei
•     Bulgaria
•     Burkina Faso
•     Burundi
•     Cambodia
•     Cameroon
•     Canada
•     Cape Verde
•     Cayman Islands
•     Centr.Afr.Rep.
•     Chad
•     Chile
•     China
•     Christmas Islnd
•     Cocos Islands
•     Colombia
•     Comoro Is.
•     Congo
•     Cook Islands
•     Costa Rica
•     Croatia
•     Cuba
•     Curacao
•     Cyprus
•     Czech Republic
•     Dem. Rep. Congo
•     Denmark
•     Djibouti
•     Dominica
•     Dominican Rep.
•     Ecuador
•     Egypt
•     El Salvador
•     Equatorial Gui.
•     Eritrea
•     Estonia
•     Ethiopia
•     Falkland Islnds
•     Faroe Islands
•     Fiji
•     Finland
•     France
•     Fren.Polynesia
•     French Guinea
•     Gabon
•     Gambia
•     Georgia
•     Germany
•     Ghana
•     Gibraltar
•     Greece
•     Greenland
•     Grenada
•     Guadeloupe
•     Guam
•     Guatemala
•     Guernsey
•     Guinea Republic
•     Guinea-Bissau
•     Guyana
•     Haiti
•     Heard/McDon.Isl
•     Honduras
•     Hong Kong
•     Hungary
•     Iceland
•     India
•     Indonesia
•     Iran
•     Iraq
•     Ireland
•     Isle of Man
•     Israel
•     Italy
•     Ivory Coast
•     Jamaica
•     Japan
•     Jersey
•     Jordan
•     Kazakhstan
•     Kenya
•     Kiribati
•     Kuwait
•     Kyrgyzstan
•     Laos
•     Latvia
•     Lebanon
•     Lesotho
•     Liberia
•     Libya
•     Liechtenstein
•     Lithuania
•     Luxembourg
•     Macau
•     Macedonia
•     Madagascar
•     Malawi
•     Malaysia
•     Maldives
•     Mali
•     Malta
•     Marshall island
•     Martinique
•     Mauritania
•     Mauritius
•     Mayotte
•     Mexico
•     Micronesia
•     Minor Outl.Ins.
•     Moldavia
•     Monaco
•     Mongolia
•     Montenegro
•     Montserrat
•     Morocco
•     Mozambique
•     Myanmar
•     Namibia
•     Nauru
•     Nepal
•     Netherlands
•     New Caledonia
•     New Zealand
•     Nicaragua
•     Niger
•     Nigeria
•     Niue
•     Norfolk Island
•     North Korea
•     North Mariana
•     Norway
•     Oman
•     Pakistan
•     Palau
•     Palestinian Ter
•     Panama
•     PapuaNewGuinea
•     Paraguay
•     Peru
•     Philippines
•     Pitcairn Islnds
•     Poland
•     Portugal
•     Puerto Rico
•     Qatar
•     Reunion Island
•     Romania
•     Russian Fed.
•     Rwanda
•     S. Sandwich Ins
•     Saint Martin
•     Samoa,American
•     San Marino
•     SaoTome Princip
•     Saudi Arabia
•     Senegal
•     Serbia
•     Seychelles
•     Sierra Leone
•     Singapore
•     Sint Maarten
•     Slovakia
•     Slovenia
•     Solomon Islands
•     Somalia
•     South Africa
•     South Korea
•     South Sudan
•     Spain
•     Sri Lanka
•     St Barthelemy
•     St. Helena
•     St. Lucia
•     St. Vincent
•     St.Chr.,Nevis
•     St.Pier,Miquel.
•     Sth Terr. Franc
•     Sudan
•     Suriname
•     Svalbard
•     Swaziland
•     Sweden
•     Switzerland
•     Syria
•     Tadschikistan
•     Taiwan
•     Tanzania
•     Thailand
•     Timor-Leste
•     Togo
•     Tokelau Islands
•     Tonga
•     Trinidad,Tobago
•     Tunisia
•     Turkey
•     Turkmenistan
•     Turks&Caicos Is
•     Tuvalu
•     US Virgin Is.
•     USA
•     Uganda
•     Ukraine
•     Unit.Arab Emir.
•     United Kingdom
•     Uruguay
•     Uzbekistan
•     Vanuatu
•     Vatican City
•     Venezuela
•     Vietnam
•     Wallis,Futuna
•     West Saharan
•     Western Samoa
•     Yemen
•     Zambia
•     Zimbabwe

Introduction

Chapter 1: Making Paper Cryptography Tools
Chapter 2: Installing Python
Chapter 3: The Interactive Shell
Chapter 4: Strings and Writing Programs
Chapter 5: The Reverse Cipher
Chapter 6: The Caesar Cipher
Chapter 7: Hacking the Caesar Cipher with the Brute-Force Technique
Chapter 8: Encrypting with the Transposition Cipher
Chapter 9: Decrypting with the Transposition Cipher
Chapter 10: Programming a Program to Test Our Program
Chapter 11: Encrypting and Decrypting Files
Chapter 12: Detecting English Programmatically
Chapter 13: Hacking the Transposition Cipher
Chapter 14: Making a Modular Arithmetic Module for the Multiplicative and Affine Ciphers
Chapter 15: Programming the Affine Cipher
Chapter 16: Hacking the Affine Cipher
Chapter 17: The Simple Substitution Cipher
Chapter 18: Hacking the Simple Substitution Cipher
Chapter 19: The Vigenere Cipher
Chapter 20: Frequency Analysis
Chapter 21: Hacking the Viginere Cipher
Chapter 22: The One-Time Pad Cipher
Chapter 23: Finding Prime Numbers
Chapter 24: Generating Keys for the RSA Cipher
Chapter 25: Public Key Cryptography and Programming the RSA Cipher

Appendix:
Debugger
“Definitely worth the read even as an experienced Python developer. I learned more about cryptography and even a few new Python tricks.”
—Ray Doyle, The Ethical Hacker Network

“I recommend this book for anyone who wants to learn Python/programming and is interested in security or puzzles.”
—Jeanne Boyarsky, Code Ranch

“A fantastic programming and cryptography course for any high school-aged child.”
—The Old Schoolhouse Magazine

About

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin.

Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it!

You’ll also learn how to:

- Combine loops, variables, and flow control statements into real working programs
- Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish
- Create test programs to make sure that your code encrypts and decrypts correctly
- Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message
- Break ciphers with techniques such as brute-force and frequency analysis

There’s no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!

Creators

Al Sweigart is a professional software developer who teaches programming to kids and adults. He is the author of Automate the Boring Stuff with Python, Invent Your Own Computer Games with Python, and Scratch Programming Playground, also from No Starch Press. His programming tutorials can be found at inventwithpython.com.

Table of Contents

Introduction

Chapter 1: Making Paper Cryptography Tools
Chapter 2: Installing Python
Chapter 3: The Interactive Shell
Chapter 4: Strings and Writing Programs
Chapter 5: The Reverse Cipher
Chapter 6: The Caesar Cipher
Chapter 7: Hacking the Caesar Cipher with the Brute-Force Technique
Chapter 8: Encrypting with the Transposition Cipher
Chapter 9: Decrypting with the Transposition Cipher
Chapter 10: Programming a Program to Test Our Program
Chapter 11: Encrypting and Decrypting Files
Chapter 12: Detecting English Programmatically
Chapter 13: Hacking the Transposition Cipher
Chapter 14: Making a Modular Arithmetic Module for the Multiplicative and Affine Ciphers
Chapter 15: Programming the Affine Cipher
Chapter 16: Hacking the Affine Cipher
Chapter 17: The Simple Substitution Cipher
Chapter 18: Hacking the Simple Substitution Cipher
Chapter 19: The Vigenere Cipher
Chapter 20: Frequency Analysis
Chapter 21: Hacking the Viginere Cipher
Chapter 22: The One-Time Pad Cipher
Chapter 23: Finding Prime Numbers
Chapter 24: Generating Keys for the RSA Cipher
Chapter 25: Public Key Cryptography and Programming the RSA Cipher

Appendix:
Debugger

Praise

“Definitely worth the read even as an experienced Python developer. I learned more about cryptography and even a few new Python tricks.”
—Ray Doyle, The Ethical Hacker Network

“I recommend this book for anyone who wants to learn Python/programming and is interested in security or puzzles.”
—Jeanne Boyarsky, Code Ranch

“A fantastic programming and cryptography course for any high school-aged child.”
—The Old Schoolhouse Magazine
Penguin Random House Comics Retail