January 2018
Intermediate to advanced
416 pages
10h 40m
English
“Why do security police grab people and torture them? To get their information. And hard disks put up no resistance to torture. You need to give the hard disk a way to resist. That’s cryptography.”—Patrick Ball, Human Rights Data Analysis Group

In previous chapters, our programs have only worked on small messages that we type directly into the source code as string values. The cipher program we’ll make in this chapter will allow you to encrypt and decrypt entire files, which can be millions of characters in size.