The Manga Guide to Cryptography

The Manga Guide to Cryptography

The Manga Guide to Cryptography

by 
Masaaki Mitani, Shinichi Sato, Idero Hinoki, and Verte Corp.
ISBN-13: 
978-1-59327-742-0
July 2018, 240 pp.

Order now and get early access to the PDF ebook!
(What's Early Access?)
(Which chapters are available now?)

Get 30% off with the coupon code EARLYBIRD

Look Inside!

Manga Guide to CryptographyManga Guide to Cryptography
Manga Guide to CryptographyManga Guide to Cryptography

Cryptography is hard, but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic-illustrated English.

As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you’ll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography.) Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as it dives deep into advanced cryptography topics, such as classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; and how to use public key encryption technology. It also explores practical applications of encryption such as digital signatures, password security, and identity fraud countermeasures.

The Manga Guide to Cryptography is the perfect introduction to cryptography for programmers, security professionals, aspiring cryptographers, and anyone who finds cryptography just a little bit hard.

Author Bio 

Masaaki Mitani is a professor at Tokyo Denki University’s School of Engineering specializing in digital signal processing, communication, and educational engineering.

Shinichi Satou is an assistant professor at Tokyo Denki University’s School of Engineering specializing in signal processing and educational engineering.

Table of contents 

Prologue (Now Available In Early Access!)
Chapter 1: The Foundations of Encryption (Now Available In Early Access!)
Chapter 2: The Art of Symmetric-Key Algorithms
Chapter 3: Public Key Encryption
Chapter 4: The Practical Applications of Encryption
Epilogue