ABSTRACT

This section of the book describes various attacks on the ciphers and protocols mentioned in Part II. This section is not as long as it might have been since many attacks were already described when the algorithms were presented in Part II.