To get the most out of this book
When reading Modern Cryptography for Cybersecurity Professionals, you will learn the basics of how we secure data using encryption. In order to fully understand the concepts, I have provided several links in each chapter for additional research, which I encourage you to visit.
In addition, I have provided links that take you to sites to see some applications available online. For example, we'll visit sites that show us how letter frequency analysis works, how a hash algorithm transforms text, and what Morse code sounds like.
So that you can follow along, it's best to have an up-to-date browser such as Chrome, Firefox, or Safari on a Windows, macOS, or Linux machine.
Important note
Any web pages or email addresses are fictional. Any correlation with any real entities is purely coincidental.
Most of the resources will be found online, however, there are a few chapters that I will use specialized software, such as:
In Chapter 6, Examining Hash Algorithms, we'll cover how you can easily run a checksum on any file by using 7-Zip. To obtain a copy of 7-Zip, go to https://www.7-zip.org/.
In Chapter 9, Exploring IPsec and TLS, we'll take a look at PuTTY, a free SSH client you can use on a Windows system to access a single other host via Telnet and remote login (rlogin). To obtain a copy of PuTTY, go to https://www.putty.org/.
I encourage you to go to the sites I have provided to supplement your knowledge.