Summary

In this short chapter, we explored the world of cryptography in the Python standard library. We learned how to create a hash (or digest) for a message using different cryptographic functions. We also learned how to create tokens and deal with random data when it comes to the cryptography context.

We then took a small tour outside the standard library to learn about JSON Web Tokens, which are used intensively today in authentication and claims-related functionalities by modern systems and applications.

The most important thing is to understand that doing things manually can be very risky when it comes to cryptography, so it's always best to leave it to the professionals and simply use the tools we have available.

The next chapter will be all about moving away from one line of software execution. We're going to learn how software works in the real world, explore concurrent execution, and learn about threads, processes, and the tools Python gives us to do more than one thing at a time, so to speak.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset