About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 61. Chapters: Broken block ciphers, Broken hash functions, Broken stream ciphers, Data Encryption Standard, Enigma machine, Triple DES, SHA-1, MD5, RC4, RC5, Lorenz cipher, A5/1, High-bandwidth Digital Content Protection, Wired Equivalent Privacy, KASUMI, GOST, Tiny Encryption Algorithm, Temporal Key Integrity Protocol, XXTEA, Content Scramble System, Khufu and Khafre, KeeLoq, MD2, Phelix, MD4, Cryptomeria cipher, E0, Lucifer, LOKI, FEAL, COCONUT98, Madryga, NewDES, MacGuffin, LOKI97, Akelarre, Cellular Message Encryption Algorithm, RC2, SXAL/MBAL, DES-X, BassOmatic, 3-Way, Crab, FEA-M, MultiSwap, CIKS-1, M6, BaseKing, KN-Cipher, MMB, Churning, Spectr-H64, Zodiac, New Data Seal, Treyfer, Mercy, Ladder-DES, Panama, GDES, NUSH, A5/2, Snefru, Nimbus, Xenon, SOBER-128. Excerpt: An Enigma machine is any of a family of related electro-mechanical rotor cipher machines used for the encryption and decryption of secret messages. Enigma was invented by German engineer Arthur Scherbius at the end of World War I. The early models were used commercially from the early 1920s, and adopted by military and government services of several countries - most notably by Nazi Germany before and during World War II. Several different Enigma models were produced, but the German military models are the ones most commonly discussed. In December 1932, the Polish Cipher Bureau first broke Germany's military Enigma ciphers. Five weeks before the outbreak of World War II, on 25 July 1939, in Warsaw, they presented their Enigma-decryption techniques and equipment to French and British military intelligence. Thanks to this, during the war, Allied codebreakers were able to decrypt a vast number of messages that had been enciphered using the Enigma. The intelligence gleaned from this source, codenamed "Ultra" by the British, was a substantial aid to the Allied war e...