About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 182. Chapters: Block ciphers, Classical ciphers, Free ciphers, Stream ciphers, Uncracked codes and ciphers, Data Encryption Standard, Blowfish, Triple DES, Advanced Encryption Standard, One-time pad, Pig Latin, International Data Encryption Algorithm, Substitution cipher, RC4, Atbash, Caesar cipher, Voynich manuscript, Vigenere cipher, ROT13, Transposition cipher, RC5, Poem code, Autokey cipher, Scytale, RC6, Polyalphabetic cipher, Tabula recta, Playfair cipher, Mirror writing, Taman Shud Case, Zodiac Killer, ryabha a numeration, Kryptos, A5/1, Grille, Beale ciphers, Format-preserving encryption, VEST, ESTREAM, Hill cipher, VIC cipher, Tiny Encryption Algorithm, Hasty Pudding cipher, Affine cipher, Salsa20, ADFGVX cipher, Running key cipher, Shugborough inscription, Camellia, Trivium, XXTEA, Content Scramble System, Four-square cipher, SHACAL, Khufu and Khafre, Thomas Brierley, Book cipher, Pigpen cipher, KeeLoq, Cipher security summary, Ricky McCormick murder notes, Dorabella Cipher, Grain, Skipjack, Two-square cipher, Feedback with Carry Shift Registers, Twofish, Phelix, SAFER, GOST, Serpent, Alberti cipher, Cryptomeria cipher, Nihilist cipher, QUAD, Substitution-permutation network, Solitaire, Great Cipher, Tap code, RadioGatun, Py, Achterbahn, Arnold Cipher, CAST-128, FEAL, Straddling checkerboard, FROG, Gilbert Vernam, COCONUT98, MUGI, Trifid cipher, MISTY1, Polybius square, DRYAD, Shrinking generator, NewDES, DFC, RSA Secret-Key Challenge, Intel Cascade Cipher, MacGuffin, ICE, MULTI2, LOKI97, Crypto-1, Hierocrypt, Dvorak encoding, Akelarre, Xmx, SEED, Rabbit, Threefish, M-94, Cellular Message Encryption Algorithm, SOBER, ISAAC, Trithemius cipher, RC2, Idea NXT, MARS, SXAL/MBAL, Alternating step generator, Anubis, Rambutan, BassOmatic, KHAZAD, 3-Way, Crab, SMS4, FEA-M, BATON, European Voynich Alphabet, D'Agapeyeff cipher, C...