The Manga Guide to Cryptography - Mitani, Masaaki; Sato, Shinichi; Hinoki, Idero; Verte Corp.

15,99
versandkostenfrei*
Preis in Euro, inkl. MwSt.
Sofort lieferbar
8 °P sammeln

    Broschiertes Buch

The Manga Guide to Cryptography breaks down how ciphers work, what makes them secure or insecure, and how to decode them. Comic illustrations make it easy to learn about classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; how to use public key encryption technology to generate public/private keys and cryptograms; practical applications of encryption such as digital signatures, identity fraud countermeasures, and 'man in the middle' attack countermeasures.…mehr

Produktbeschreibung
The Manga Guide to Cryptography breaks down how ciphers work, what makes them secure or insecure, and how to decode them. Comic illustrations make it easy to learn about classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; how to use public key encryption technology to generate public/private keys and cryptograms; practical applications of encryption such as digital signatures, identity fraud countermeasures, and 'man in the middle' attack countermeasures.
  • Produktdetails
  • Verlag: No Starch Press
  • Seitenzahl: 248
  • Erscheinungstermin: Juli 2018
  • Englisch
  • Abmessung: 233mm x 177mm x 20mm
  • Gewicht: 505g
  • ISBN-13: 9781593277420
  • ISBN-10: 1593277423
  • Artikelnr.: 47885855
Autorenporträt
Masaaki Mitani is a professor at Tokyo Denki University's School of Engineering specializing in digital signal processing, communication, and educational engineering.
Shinichi Satou is an assistant professor at Tokyo Denki University's School of Engineering specializing in signal processing and educational engineering
Inhaltsangabe
Prologue

Chapter 1: The Foundations of Encryption
Chapter 2: The Art of Symmetric-Key Algorithms
Chapter 3: Public Key Encryption Technology
Chapter 4: On the Practical Applications of Encryption

Epilogue