Wikipedia talk:WikiProject Cryptography/Archive 5
Elliptic curve Diffie–HellmanI've just moved Elliptic Curve Diffie-Hellman (with the incorrectly capitalized "C" and the hyphen where an endash should be) to Elliptic curve Diffie–Hellman. I've fixed the double redirects. Could others help fix the other redirects? How did so many links get made to such a conspicuously incorrect title? Do people who work on cryptography articles generally disregard Wikipedia's conventions—even simple and basic ones like these? Michael Hardy (talk) 14:06, 23 October 2009 (UTC)
Data encryption standard FARI have nominated Data Encryption Standard for a featured article review here. Please join the discussion on whether this article meets featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Remove" the article's featured status. The instructions for the review process are here. Tom B (talk) 22:08, 4 November 2009 (UTC) NSA Encryption SystemsThe NSA Encryption Systems page has red/black reversed, at least according to the Red/Black Concepts page. Red is supposed to mean unencrypted and black means encrypted. Think Red means Danger and Black is like Men In Black :) —Preceding unsigned comment added by 68.44.28.147 (talk) 21:52, 13 December 2009 (UTC)
I feel the title is not the best one for this book (although I'm not entirely sure what exactly the book is about). Could someone give it a look? Headbomb {ταλκκοντριβς – WP Physics} 21:56, 8 January 2010 (UTC)
This article has been proposed for deletion. It may be easy to save. If you are knowledgeable in the field please have a look. -Arb. (talk) 12:49, 3 February 2010 (UTC)
FARI have nominated OpenBSD for a featured article review here. Please join the discussion on whether this article meets featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Remove" the article's featured status. The instructions for the review process are here.YellowMonkey (vote in the Southern Stars and White Ferns supermodel photo poll) 03:57, 26 March 2010 (UTC) Split SHA hash functions to SHA-1 and SHA-2I started a discussion about splitting the current SHA hash functions article in two, at Talk:SHA hash functions#SHA-1 and SHA-2 split. Anyone's input is welcome! -- intgr [talk] 19:27, 31 March 2010 (UTC) Missing cryptography topicsCan anybody have a look at this list of missing cryptography topics - Skysmith (talk) 12:12, 8 April 2010 (UTC) Weak security categoriesWP should have a couple categories to identify weak and broken crypto. I think articles such as WEP, Crypt_(Unix), md5, Enigma and Cryptoloop should be in something like Category:Broken cryptography for algorithms and software that have serious design or implementation flaws (not of the rubber-hose cryptanalysis type). I think articles such as Adobe Flash, and Little Snitch should be in something like Category:Insecurely distributed software for software distributed only via insecure methods, such as over ftp or http, without PKI-based signatures or securely distributed secure checksums, or without tamper-resistant retail packaging. (The related Category:Securely distributed software is probably also appropriate, e.g. for software like LastPass and the Linux Kernel; the latter get credit for defense in depth; the stuff is served over https, and is PGP-signed.) Thought I'd post here for any feedback before getting started on making it so; we could mention this at Wikipedia talk:Categorization. Notes: These would NOT be for indicating software with remedied or un- remedied exploits. Besides, those are too transient to be practical (unless the flaws go uncorrected for a long time), or too unimportant to be encyclopedic. (Categories need parents; will need to take care of that.... Oh, Category:Broken cryptography algorithms ∃. ) --Elvey (talk) 04:27, 23 October 2010 (UTC)
Fix SHA-2 page[Discussion moved to Talk:SHA-2 -- intgr [talk] 17:28, 6 January 2011 (UTC)] ReferencesCryptography FARI have nominated Cryptography for a featured article review here. Please join the discussion on whether this article meets featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Delist" the article's featured status. The instructions for the review process are here.Smallman12q (talk) 14:15, 27 January 2011 (UTC) U.S. Lifted Export Restrictions.U.S. Government article lifting export restrictions on strong cryptographic software. —Preceding unsigned comment added by 146.127.253.12 (talk) 22:54, 10 February 2011 (UTC) Ricky McCormick murder notesI have started an article on the Ricky McCormick murder notes for which the FBI just asked for public help in decoding. --agr (talk) 22:45, 29 March 2011 (UTC) CopyVio suspectThere's a CopyVio discussion [[1]] about a steganalysis diagram. Interested users may consider reading the nomination page and the related article Blackvisionit (talk) 18:54, 15 July 2011 (UTC) Could use some more eyes on it. I know very little about this field but at a glance this looks like it may include WP:OR. Beeblebrox (talk) 17:02, 21 August 2011 (UTC) Making binary human-readable/pronounceable for cryptographic, similar purposesHi. In the course of considering the Bubble Babble article, we/I came to the realization that it might be useful to merge it and some other articles on algorithms into one article on transforming binary into something human-readable/pronounceable, either via generating pseudowords/logatomes (like Bubble Babble) or into series of actual words (like the PGP word list, Diceware, and S/KEY). Any thoughts? What other algorithms exist and should be in such an article? What's the proper name for such an article? Thanks very much! Allens (talk) 01:02, 1 November 2011 (UTC)
Template:WikiProject Cryptography and assessmentsAny particular reason why Template:WikiProject Cryptography does not support assessments? --Piotr Konieczny aka Prokonsul Piotrus| talk to me 02:53, 9 February 2012 (UTC)
Random functionPlease consider article random function. Presently it contains cryptography-based stuff, that seems very unclear and uncited. It seems to be using the term in a way that partly conflicts with what would be wanted for a more general article in the context of probability theory or statistics. A question is whether what is in the article does actually reflect usage in cryptography and whether it would be better dealt with under someother establisahed terminology. But a clean-up to raise the article from stub status would be good in any case. Melcombe (talk) 17:12, 28 February 2012 (UTC)
When is a cryptographic algorithm notable?Let's see how alive this WikiProject is. I am currently going through a list of cryptography articles in my attempt to rate them with quality and importance asssessments. What I have found is that there are a few articles on cryptographic algorithms whose notability is highly questionable. As an example, here are three block cipher algorithms that all seem to be based on the same principle and which seem to be based on two main authors, Nikolay Moldovyan and Alexander Moldovyan: Cobra ciphers, CIKS-1, and Spectr-H64. The basic principle of the algorithms is that of "data-dependent permutations", which is based on the more general principle of data-dependent operations (e.g., rotations, key scheduling, etc.), which really isn't that new. The concept is suggested to develop faster ciphers. The problem now is threefold:
So the question is: Does a publication in a journal automatically warrant notability? (My opinion: Getting something published is not a high barrier, and this alone is certainly insufficient.) Does the existence of a few papers by independent authors, showing that the design is insecure, warrant notability? (My opinion: If the fact that a design was insecure were so surprising then it certainly would be discussed more widely. Otherwise, it is not enough to indicate notability.) And does the existence of better designs, which refer to the original design, justify inclusion on Wikipedia? (My opinion: If the original design was truly "original" it would be highly cited, thus proving notability. Otherwise, it may warrant a mention in a more general Wikipedia article, but not as a stand-alone article.) I'd be interested in your thoughts on this. If I don't get any response, I'll bring the three articles to AfD. Cheers, and many thanks, Nageh (talk) 17:52, 12 April 2012 (UTC)
Ok, I have found where these articles could be redirected to. An article on lightweight cryptography. Unfortunately, it has to be created first. :/ Nageh (talk) 20:04, 13 April 2012 (UTC) Article alertsFYI, I have set up Article alerts for this WikiProject. Any articles whose talk pages are tagged with the {{WikiProject Cryptography}} template and requiring maintenance action (WP:AfD, WP:PROD, WP:RfC, WP:FAC, etc.) will be listed at Wikipedia:WikiProject Cryptography/Article alerts in the future. Nageh (talk) 17:16, 14 April 2012 (UTC) Phone hackingArticle is an epic fail in terms of its description of the crypto issues around weak PINs. My edits have been reverted, and I don't have the time at the moment to address this, so flagging for attention here. (e.g. the predicable PINs that allowed voicemail services to be "hacked" have nothing to do with any defaults configured on handsets) Socrates2008 (Talk) 08:52, 25 July 2012 (UTC) Rationale for including functions in the hash function templateWhat is the rationale for including hash functions in the template? Functions like FSB, ECOH, and SWIFFT were SHA-3 candidates but not very signicant ones; they did not pass to the second round. Why are they listed here when most second round candidates are not? Same question for the list here: List_of_hash_functions#Cryptographic_hash_functions. That list also include Spectral Hash, a completely broken SHA-3 candidate. On a related note, many second round candidates do not have a Wikipedia page, even though they are much more significant than Spectral Hash... Ni fr (talk) 12:57, 18 April 2013 (UTC)
New PagesNew pages added for Hut 3 & Hut 4; they were redirects to Bletchley Park. Any other "Hut" articles warranted? Hugo999 (talk) 11:34, 25 April 2013 (UTC) Quick question about ARIA cipherPlease answer at Talk:ARIA (cipher) if you know if the name stands for something or not. Ego White Tray (talk) 12:28, 25 April 2013 (UTC) RfC concerning the Lavabit email serviceThere is a request for comments (RfC) that may be of interest. The RfC is at At issue is whether we should delete or keep the following text in the Lavabit article:
Your input on this question would be very much welcome. --Guy Macon (talk) 05:07, 29 August 2013 (UTC) Implementations in source codeShould more of the articles have simple implementations in source code? A good example is the md5 article which has the implementation in pseudocode as well as the C programing language. Thea10 (talk) 16:23, 13 September 2013 (UTC) Unfortunately, dozens of programming languages have their own programming language partisans that feel they need to "promote" their favorite programming language wherever possible. People who are not programming language partisans generally feel that including an implementation in every one of those languages in a single article is excessive. (Wikipedia talk:WikiProject Computer science/Manual of style#Concrete Implementations of Algorithms; Wikipedia talk:Algorithms on Wikipedia/More talk). Rather than put source code directly into the Wikipedia article, perhaps it is better to put that source code into Wikibooks: Cryptography, or into a wiki dedicated to source code such as http://rosettacode.org/ (In particular, see http://rosettacode.org/wiki/MD5/Implementation ), http://en.literateprograms.org/ , http://codesnippets.wikia.com , or etc., or into some other source code repository website. Then add a (indirect) link into the Wikipedia article pointing at that off-site source code. Alas, some people think that merely *linking* to implementations in many languages is excessive (Wikipedia talk:WikiProject Computer science/Archive 10#External links to implementations). --DavidCary (talk) 06:36, 4 February 2014 (UTC) Entropy Page In Need of ReviewI noticed today that the Entropy(Computing) Page has been marked as in need of an expert reviewer since 2009. Is there anyone in this project that might be up to the task? I read the entire page and think it sounds pretty good. Then again, I'm a chemist, and not a cryptographer or computer security expert. With the recent comments of L. Torvalds and the Change .org petition regarding /dev/random, it's a page that will probably be hit more often. Sean Egan (talk) 21:46, 7 October 2013 (UTC)
Post-quantum cryptographyEven though current publicly known experimental quantum computing is nowhere near powerful enough to attack real cryptosystems[1] "citation requested" — Preceding unsigned comment added by 67.8.242.175 (talk) 02:11, 26 November 2013 (UTC) Discussion at Template_talk:WikiLeaks
Assassination market article - anyone want to help?After the in-depth Forbes article on the Bitcoin/Tor-based Assassination Market website, this article (about the general concept of an assassination market, not the Internet specifically implementation) is looking a bit out of date. If it's within the remit of this project, anyone want to help out with updating it? Jonathan Deamer (talk) 21:04, 9 December 2013 (UTC) Invitation to help craft a proposalSurveillance awareness day is a proposal for the English Wikipedia to take special steps to promote awareness of global surveillance on February 11, 2014. That date is chosen to coincide with similar actions being taken by organizations such as Mozilla, Reddit, and the Electronic Frontier Foundation. Feedback from members of this Wikiproject would be greatly appreciated. Please come join us as we brainstorm, polish, and present this proposal to the Wikipedia Community. --HectorMoffet (talk) 11:21, 18 January 2014 (UTC) Password Hashing CompetitionIs the recently-created "Password Hashing Competition" article too much WP:CRYSTALBALL ? --DavidCary (talk) 19:06, 21 January 2014 (UTC) Salted Challenge Response Authentication MechanismI want to create an article about Salted Challenge Response Authentication Mechanism. Here is my draft. How can I improve it? Thank youMuelleum (talk) 20:59, 29 January 2014 (UTC) A recently created redirect, Numerical cipher (edit | talk | history | protect | delete | links | watch | logs | views), currently points to Bifid cipher, is this correct? -- 70.50.151.11 (talk) 10:15, 23 February 2014 (UTC) List of unsolved problems in CryptographyFYI, List of unsolved problems in Cryptography (edit | talk | history | protect | delete | links | watch | logs | views) has been nominated for deletion. -- 70.50.151.11 (talk) 10:27, 23 February 2014 (UTC)
Supersingular Isogeny Key ExchangeDraft:Supersingular Isogeny Key Exchange needs your help. Please chime at the Articles for creation help desk. Chris Troutman (talk) 02:10, 21 May 2014 (UTC) Dear encryption experts: The above AfC submission may be of interest. —Anne Delong (talk) 15:57, 15 June 2014 (UTC) Kama Sutra Cipher article vastly inaccurateThe Kama Sutra doesn't have a 45th chapter. The Kama Sutra instead describes cryptography as a recommendation for pleasurable activities to be pursued by women. I believe it is actually number 44 on the list. It's easy enough to find in the translation in Project Gutenberg by searching for the word "cypher." There are a lot of places that repeat this misinformation, possibly because it's on Wikipedia. One source I've found, The Six Unsolved Ciphers, seems to have a bit better of a description, and is consistent with further academic sources I've found. Note that I've found academic sources that cited the incorrect Wikipedia article (why would you do that?). The words to look for are Muladeviya and Kautilyam. The best source I've found thus far: Novel Cipher Technique Using Substitution Method, Shobha Vatsa, Tanmeya Mohan, A. K. Vatsa, International Journal of Information & Network Security (IJINS), Vol.1, No.4, October 2012, pp. 313~320, ISSN: 2089-3299 Page 317 touches on the Kama Sutra cipher, and describes what is shown in the Wikipedia as Muladeviya. The wording around it is a bit difficult to parse though. It references a research paper "presented as Aryabhata's Mathematics," and that Yasodhara described this cipher along with Kautiliyam (substitutions based on phonetic relations). Unfortunately the citation for that section looks like this: http:// Aryabhata‟s Mathematics by Subhash Kak, RSA Conference, San Jose, Feb. 13-17, 2006 Please pardon my formatting, I haven't edited Wikipedia before aside for minor spelling corrections. — Preceding unsigned comment added by 132.198.220.151 (talk) 14:40, 17 June 2014 (UTC) This is a notice that the article SQRL, which may be within the scope of your WikiProject, has been nominated for deletion. If this is of interest to your members, their input would be appreciated. 0x0077BE [talk/contrib] 14:43, 23 July 2014 (UTC) I have drafted an article on the Walsh Report more correctly titled Review of Policy relating to Encryption Technologies that was conducted for the Australian government in 1996. Having been a board member of Electronic Frontiers Australia who played a major role in the Walsh Report I have a potential conflict of interest in this article. Could one or more editors here please review my draft, edit it if you want to, and—if you then consider it sufficiently neutral and meeting other criteria for Wikipedia articles—move it to mainspace. Tango Mike Bravo (talk) 08:44, 23 August 2014 (UTC) Thanks to User:Graeme Bartlett this has now been moved to mainspace. Tango Mike Bravo (talk) 11:32, 15 September 2014 (UTC) Comment on the WikiProject X proposalHello there! As you may already know, most WikiProjects here on Wikipedia struggle to stay active after they've been founded. I believe there is a lot of potential for WikiProjects to facilitate collaboration across subject areas, so I have submitted a grant proposal with the Wikimedia Foundation for the "WikiProject X" project. WikiProject X will study what makes WikiProjects succeed in retaining editors and then design a prototype WikiProject system that will recruit contributors to WikiProjects and help them run effectively. Please review the proposal here and leave feedback. If you have any questions, you can ask on the proposal page or leave a message on my talk page. Thank you for your time! (Also, sorry about the posting mistake earlier. If someone already moved my message to the talk page, feel free to remove this posting.) Harej (talk) 22:47, 1 October 2014 (UTC) Distributed key generation/Threshold crytosystemI did a bit of work on the distributed key generation page and I'd like to take it off the stub listing. Can I get someone to review it? Also, distributed key generation is the same thing as a threshold cryptosystem, but I haven't really been around long enough to know what goes into page merging. Can anyone help me out with this? Thanks! Farabeeandrew (talk) 05:07, 31 October 2014 (UTC) Marian Rejewski FARI have nominated Marian Rejewski for a featured article review here. Please join the discussion on whether this article meets featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Delist" the article's featured status. The instructions for the review process are here. SandyGeorgia (Talk) 10:37, 12 January 2015 (UTC) WikiProject X is live!![]() Hello everyone! You may have received a message from me earlier asking you to comment on my WikiProject X proposal. The good news is that WikiProject X is now live! In our first phase, we are focusing on research. At this time, we are looking for people to share their experiences with WikiProjects: good, bad, or neutral. We are also looking for WikiProjects that may be interested in trying out new tools and layouts that will make participating easier and projects easier to maintain. If you or your WikiProject are interested, check us out! Note that this is an opt-in program; no WikiProject will be required to change anything against its wishes. Please let me know if you have any questions. Thank you! Note: To receive additional notifications about WikiProject X on this talk page, please add this page to Wikipedia:WikiProject X/Newsletter. Otherwise, this will be the last notification sent about WikiProject X. Harej (talk) 16:57, 14 January 2015 (UTC) NEM - New Economy Movement listed at Requested moves![]() A requested move discussion has been initiated for NEM - New Economy Movement to be moved to NEM (cryptocurrency). This page is of interest to this WikiProject and interested members may want to participate in the discussion here. —RMCD bot 23:21, 28 May 2015 (UTC) Block chain (transaction database) listed at Requested moves![]() A requested move discussion has been initiated for Block chain (transaction database) to be moved to Block chain. This page is of interest to this WikiProject and interested members may want to participate in the discussion here. —RMCD bot 23:23, 28 May 2015 (UTC) "Deep Web"The usage and primary topic of Deep Web is under discussion, see talk:Dark Web -- 67.70.32.190 (talk) 05:16, 10 August 2015 (UTC) DROWNI've created an article on the DROWN attack: it's very basic at the moment, and needs both expansion and fact-checking. -- Markshale (talk) 00:36, 2 March 2016 (UTC) Double ratchet article may need to be generalizedDo any of you know of other double ratchet constructions than the one developed by Trevor Perrin and Moxie Marlinspike in 2013? It has been suggested on Talk:Double ratchet that there are "numerous double ratchet constructions possible", in which case the Double ratchet article may need to be generalized. --Dodi 8238 (talk) 09:16, 9 April 2016 (UTC) I've now renamed the article as "Double Ratchet Algorithm" because it is mainly about the algorithm that was developed by Perrin and Marlinspike. The term "double ratchet" now redirects there, but that page can be converted into a general article about double ratchet constructions if enough secondary sources are found. --Dodi 8238 (talk) 10:16, 9 April 2016 (UTC) OpenBSDI have nominated OpenBSD for a featured article review here. Please join the discussion on whether this article meets featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Delist" the article's featured status. The instructions for the review process are here. Tonystewart14 (talk) 15:10, 11 May 2016 (UTC) Hi experts, help requested on the Holy Shrine of cryptography!Hi all, I don't know how active this WikiProject (still) is, but a request for help can be found here: Talk:Voynich manuscript#The Holy Shrine of cryptography - expert eyes requested, any help is welcome to solve this mystery...joking...to help clean-up the page and get rid of the citation needed tags. I've done some 15 myself, but I lack the experience on cryptography to touch those, so if anybody can help, please! Cheers, Tisquesusa (talk) 01:15, 12 June 2016 (UTC) AfDThere is a current AfD on ShapeShift (company), at Wikipedia:Articles for deletion/ShapeShift (company). More input from coummunity editors would be appreciated. N2e (talk) 18:04, 3 July 2016 (UTC) List of WWII cipher divisions of the WehrmachtI know very little about cryptography compared with, no doubt, any member of this project. But I do a lot of WP copyediting, and when Scope creep asked me to copyedit some articles for them, starting with Pers Z S, I was happy to comply. Much of the text in these articles seems to have been translated, I suppose from German, by a German-speaker with good but not perfect English, so there's more copyediting than I expected. (I'm a linguist, by the way.) Point here is, I've found a list of abbreviations for many (all?) of the cipher divisions of the Wehrmacht in WWII and put it into Talk:Cipher Department of the High Command of the Wehrmacht § Sections and abbreviations. It may be useful as a reference and source of topics for this project. Please {{Ping}} me to discuss. --Thnidu (talk) 05:20, 25 September 2016 (UTC) What is meant by "Break"?I suspect that the majority of readers assume that once a cryptosystem is broken, all intercepted messages can then be read quickly. Certainly in the pre-computer era, this was not the case. A system might be broken in the sense of the mechanisms being diagnosed, but thereafter each message or group of messages could require laborious key-finding which might take a long time and might fail. The usefulness of breaking World War II systems depended on timeliness and completeness. It would be helpful if articles saying that systems were broken stated how quickly messages were read, whether some could not be read with the resources available and what proportion of messages yielded useful information. This may be difficult, but it seems to me to be a worthwhile aim. --TedColes (talk) 07:43, 1 October 2016 (UTC) Pseudorandom permutation mergeThere is a long-standing merge proposal for Pseudorandom permutation and Unpredictable permutation that would benefit from some expert help. Are these sufficiently similar to merge? Please respond on the merge discussion. Klbrain (talk) 17:17, 10 December 2016 (UTC)
RfC Announce: Wikimedia referrer policyIn February of 2016 the Wikimedia foundation started sending information to all of the websites we link to that allow the owner of the website (or someone who hacks the website, or law enforcement with a search warrant / subpoena) to figure out what Wikipedia page the user was reading when they clicked on the external link. The WMF is not bound by Wikipedia RfCs, but we can use an advisory-only RfC to decide what information, if any, we want to send to websites we link to and then put in a request to the WMF. I have posted such an advisory-only RfC, which may be found here: Wikipedia:Village pump (policy)#RfC: Wikimedia referrer policy Please comment so that we can determine the consensus of the Wikipedia community on this matter. --Guy Macon (talk) 21:45, 10 June 2017 (UTC) Autokey cipherI'm trying to clean up the Autokey cipher page, which has some jargon and leaves some things unexplained. In particular, there is a section on decryption that was added by user Frankd about a decade ago that has several parts that baffle me. In the section that starts "Trying this with "OUN"", the examples that follow don't seem to make sense - each one replaces the first three letters of the partial key with a different part of the results from the previous step. For instance, in "by 5", the three letters in question are chosen from the "unlikely" pile. My confusion is that the section starts with "Trying this with OUN" and then doesn't try it with OUN. Can someone that better understand this example explain this? Maury Markowitz (talk) 21:46, 23 November 2017 (UTC)
|