About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 57. Chapters: Data Encryption Standard, Blowfish, Triple DES, Advanced Encryption Standard, International Data Encryption Algorithm, Block cipher, RC5, RC6, Format-preserving encryption, Tiny Encryption Algorithm, Hasty Pudding cipher, Camellia, XXTEA, Content Scramble System, SHACAL, Khufu and Khafre, KeeLoq, Cipher security summary, Skipjack, Twofish, SAFER, GOST, Serpent, Cryptomeria cipher, Substitution-permutation network, CAST-128, FEAL, FROG, COCONUT98, MISTY1, NewDES, DFC, Intel Cascade Cipher, MacGuffin, ICE, MULTI2, LOKI97, Hierocrypt, Akelarre, Xmx, SEED, Threefish, Cellular Message Encryption Algorithm, RC2, Idea NXT, MARS, SXAL/MBAL, Anubis, BassOmatic, KHAZAD, 3-Way, Crab, SMS4, FEA-M, BATON, CIPHERUNICORN-E, ABC, KFB mode, MultiSwap, CIKS-1, ARIA, CIPHERUNICORN-A, SHARK, M6, BaseKing, KN-Cipher, MMB, DEAL, Spectr-H64, Zodiac, New Data Seal, Treyfer, SC2000, Mercy, Ladder-DES, CAST-256, Cobra ciphers, MAGENTA, GDES, NOEKEON, MESH, Iraqi block cipher, Injected-Block Cipher RBSC algorithm, CRYPTON, NUSH, E2, Square, Key whitening, CLEFIA, REDOC, IAPM, Red Pike, UES, Nimbus, Grand Cru, SAVILLE, CS-Cipher, Xenon, S-1 block cipher, M8, Product cipher, Libelle.