0345 4506120

Introduction to Python Cryptography

Python is an Object Oriented rapid development language deployed in many scenarios in the modern world.

This Introduction to Python Cryptography course is designed to give delegates the knowledge to develop/maintain Python based Cryptography scripts using the current version (V3) of Python.

There are many similarities between Python V2 and Python V3 so the skills gained on this course will allow the delegate to develop their own skills further using Python V2 or V3 to support the development and maintenance of their cryptographic requirements.

The delegate will learn and acquire skills as follows:

  • The differences in Random Number Generation Techniques
  • How to create symmetric keys
  • Techniques used in symmetric encryption
  • Differences between Symmetric and Asymmetric encryption
  • How signatures can be used
  • How Hash algorithms can be employed for security

Who will the Course Benefit?

Programmers who need to write or maintain Cryptography based elements in Python.

We don't currently have any courses listed for Introduction to Python Cryptography, would you like to view all courses for Programming?

Learning Objectives

Knowledge of Python to write, maintain and understand Python cryptography elements.

Pre-Requisites

Requirements

Good understanding of Python Programming to the level covered on the Python Programming course.

Pre-Requisite Courses

  • Python Programming

Course Content

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: CRYPTOGRAPHIC TERMINOLOGY

  • Key
  • Plaintext
  • Ciphertext
  • Cipher
  • Non-Uniformity
  • Key Strength
  • Key Length
  • Cipher Strength

Session 2: RANDOM NUMBERS

  • Weak vs. Strong
  • Python vs. Pycrypto
  • Labs

Session 3: SYMMETRIC KEYS

  • Symmetric Key Generation
  • AES Encryption / Decryption Example
  • Cipher Block Chaining
  • AES_CBC encryption / Decryption example
  • More Complex  AES_CBC Encryption / Decryption Example
  • Labs

Session 4: ASYMMETRIC KEYS

  • Generating the Keys
  • Using Asymmetric Keys for Encode/Decode
  • RSA Encryption Example
  • RSA Decryption Example
  • Labs

Session 5: WORKING WITH HASHES

  • Generating the Hash
  • Hashed Passwords
  • Labs

Session 6: WORKING WITH SIGNATURES

  • Keys
  • Encrypting and Signing
  • Checking Signatures
  • Decrypting
  • Labs

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include