About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 61. Chapters: Broken block ciphers, Broken hash functions, Broken stream ciphers, Data Encryption Standard, Enigma machine, Triple DES, SHA-1, MD5, RC4, RC5, Lorenz cipher, A5/1, High-bandwidth Digital Content Protection, Wired Equivalent Privacy, KASUMI, GOST, Tiny Encryption Algorithm, Temporal Key Integrity Protocol, XXTEA, Content Scramble System, Khufu and Khafre, KeeLoq, MD2, Phelix, MD4, Cryptomeria cipher, E0, Lucifer, LOKI, FEAL, COCONUT98, Madryga, NewDES, MacGuffin, LOKI97, Akelarre, Cellular Message Encryption Algorithm, RC2, SXAL/MBAL, DES-X, BassOmatic, 3-Way, Crab, FEA-M, MultiSwap, CIKS-1, M6, BaseKing, KN-Cipher, MMB, Churning, Spectr-H64, Zodiac, New Data Seal, Treyfer, Mercy, Ladder-DES, Panama, GDES, NUSH, A5/2, Snefru, Nimbus, Xenon, SOBER-128.