24PROGRAMMING THE PUBLIC KEY CIPHER

“A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography.”—Bruce Schneier, author of Applied Cryptography

Images

In Chapter 23, you learned how public key cryptography works and how to generate public and private key files using the public key generation program. Now you’re ready to send your public key file to others (or post it online) so they can

use it to encrypt their messages before sending them to you. In this chapter, you’ll write the public key cipher program that encrypts and decrypts messages using the public and private keys you generated. ...

Get Cracking Codes with Python now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.