Click to view the other books

Chapters

Download the complete book as a PDF.

Chapter 1 - Making Paper Cryptography Tools [related content]
Chapter 2 - Downloading and Installing Python [related content]
Chapter 3 - The Interactive Shell [related content]
Chapter 4 - Strings and Writing Programs [related content]
Chapter 5 - The Reverse Cipher [related content]
Chapter 6 - The Caesar Cipher [related content]
Chapter 7 - Hacking the Caesar Cipher with the Brute Force Technique [related content]
Chapter 8 - The Transposition Cipher, Encrypting [related content]
Chapter 9 - The Transposition Cipher, Decrypting [related content]
Chapter 10 - Programming a Program to Test Our Program [related content]
Chapter 11 - Encrypting and Decrypting Files [related content]
Chapter 12 - Detecting English Programmatically [related content]
Chapter 13 - Hacking the Transposition Cipher [related content]
Chapter 14 - Modular Arithmetic and the Multiplicative Cipher [related content]
Chapter 15 - The Affine Cipher [related content]
Chapter 16 - Hacking the Affine Cipher [related content]
Chapter 17 - The Simple Substitution Cipher [related content]
Chapter 18 - Hacking the Simple Substitution Cipher [related content]
Chapter 19 - The Vigenère Cipher [related content]
Chapter 20 - Frequency Analysis [related content]
Chapter 21 - Hacking the Vigenère Cipher [related content]
Chapter 22 - The One-Time Pad Cipher [related content]
Chapter 23 - Finding Prime Numbers [related content]
Chapter 24 - Public Key Cryptography and the RSA Cipher [related content]

This book is brought to you by the encouragement and donation of many kind folk.