Wikipedia:WikiProject Cryptography

From Wikipedia, the free encyclopedia

Shortcut:
WP:CRYPT

The aim of WikiProject Cryptography is to help editors working on cryptography articles by providing a repository of information and resources, and providing a place for discussions that affect more than one article. See also the Cryptography WikiPortal.

Contents

[edit] Lists and categories

Editor oriented lists:


Reader oriented lists:

[edit] Featured articles

See /Featured for the subproject concerning bringing articles to featured status. Mangojuicetalk 19:09, 2 July 2006 (UTC)

[edit] Summaries

The following are monthly summaries of activity within the WikiProject:

[edit] Some open tasks

Image:Evolution-tasks.png


[edit] Discussions

[edit] Active

[edit] Inactive

[edit] Participants

If you're interested in editing cryptography articles, you might like to add yourself to this list, possibly with some information on what you know about / like to work on. New additions at the bottom, please.

You might also consider adding yourself to the Category:WikiProject Cryptography participants. See instructions on that category page for how to do it. However, note that that does not get you onto the list here and that the list here has advantages in that you can add a short description of interests.

[edit] Stats

Date Total number of articles Number of stubs1
23/March/04 319 85
12/April/04 355 100
3/May/04 414 119
11/June/04 500 165
13/October/04 605 178
11/March/05 692 176
2/February/06 978 235

[1] "Stubs" are defined as articles with less than 1000 characters. Articles are counted from List of cryptography topics.

[edit] Cryptography in other Wikimedia projects

[edit] Free content

[edit] Other Internet content

[edit] Other cryptography encyclopedias

  • David E. Newton's Encyclopedia of Cryptology (ISBN 0874367727), 1998, has over 550 articles with an overall slant on the history of cryptography, but plenty of modern topics included as well.
  • Microsoft® Encyclopedia of Security, 800 pages (May 14, 2003), Microsoft Press International, ISBN 0735618771. (Table of contents). While covering the entire field of security, it has entries on a number of crypto topics.

[edit] Templates

[edit] {{CryptographyProject}}

We might wish to tag the Talk: pages of articles which are directly about cryptography with a notice about this WikiProject. For this purpose, there is {{CryptographyProject}}, which expands to the following:

WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography in the Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.

(Discussion at /WikiProject Notice)


[edit] {{Infobox block cipher}}

Discussion at: Template talk:Infobox block cipher.

Currently trialling Template:Infobox block cipher on AES, Blowfish, DEAL, DES, FEAL, GOST, IDEA, LOKI97, MISTY1, RC2, RC5, Serpent, Square, TEA, Triple DES, Twofish, XTEA

(Would) Need to apply to: 3-Way, Camellia, CAST-128, CAST-256, CMEA, DES-X, GDES, Iraqi block cipher, KASUMI, Khafre, KHAZAD, Khufu, LOKI89/91, Lucifer, MAGENTA, MARS, MMB, NewDES, Red Pike, S-1, SAFER, SHARK, Skipjack, RC6.


[edit] {{crypto-stub}}

Instead of {{stub}}, you might want to use {{crypto-stub}}. One advantage is that Category:Cryptography stubs gives a list of all the cryptography-related stubs. The message is:


[edit] {{User WikiProject Cryptography}}

If you add this userbox to your userpage you get automatically included in the Category:WikiProject Cryptography participants. It produces:

This user is a participant in WikiProject Cryptography.


 

[edit] Navigational templates

Cryptography has some navigational elements to make it easier for a reader to find related topics.

[edit] {{Cryptography portal}}

To inform users about the cryptography portal this template can be placed in the top of the "See also" section of articles.


[edit] {{Crypto navbox}}

It produces:

Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers

[edit] The main crypto navigation box

This template is the main crypto navigation box. It can be added to the bottom of any cryptography article. This template also has some magic so it can include one or more of the specialised crypto navigation boxes inside the same frame.

To only use this template alone add this code to the bottom of an article:

{{crypto navbox}}

If you want it to also show for instance the specialised navigation box about stream ciphers then give it the "stream" parameter, like this:

{{crypto navbox | stream}}

You can also add several boxes in it, like this:

{{crypto navbox | block | stream}}

Note that the parameters come sort of in backwards order. In the example above the stream cipher box will be on top, followed by the block cipher box and then with the main crypto "navbox" at the bottom.

Here is an invalid example since "navbox" should not be a parameter but instead is part of the address of this template:

{{crypto stream | navbox}}

The available specialised boxes are:

block, stream, public-key, hash, machines, classical

For more details about these navigation boxes please see the description on the page of the main crypto navigation box itself. Below are examples of usage with the specialised boxes.


[edit] {{Crypto navbox | block | stream}}

It produces:

Stream ciphers
v  d  e
Algorithms: A5/1 | A5/2 | FISH | Grain | HC-256 | ISAAC | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
Theory: Shift register | LFSR | NLFSR | Shrinking generator   Standardization: eSTREAM
Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | Cobra | CMEA | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | block}}

It produces:

Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | Cobra | CMEA | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | stream}}

It produces:

Stream ciphers
v  d  e
Algorithms: A5/1 | A5/2 | FISH | Grain | HC-256 | ISAAC | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
Theory: Shift register | LFSR | NLFSR | Shrinking generator   Standardization: eSTREAM
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | public-key}}

It produces:

Public-key cryptography
v  d  e
Algorithms: Cramer-Shoup | DH | DSA | ECDH | ECDSA | EKE | ElGamal | GMR | IES | Lamport | MQV | NTRUEncrypt | NTRUSign | Paillier | Rabin | Rabin-Williams | RSA | Schnorr | SPEKE | SRP | XTR
Theory: Discrete logarithm | Elliptic curve cryptography | RSA problem
Standardization: ANS X9F1 | CRYPTREC | IEEE P1363 | NESSIE | NSA Suite B   Misc: Digital signature | Fingerprint | PKI | Web of trust | Key size
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | hash}}

It produces:

Hash algorithms: Gost-Hash | HAS-160 | HAVAL | MDC-2 | MD2 | MD4 | MD5 | N-Hash | RIPEMD | SHA family | Snefru | Tiger | VEST | WHIRLPOOL | crypt(3) DES
MAC algorithms: Data Authentication Code | CBC-MAC | HMAC | OMAC/CMAC | PMAC | UMAC | Poly1305-AES | VEST
Authenticated encryption modes: CCM | EAX | GCM | OCB | VEST   Attacks: Birthday attack | Collision attack | Preimage attack | Brute force attack
Standardization: CRYPTREC | NESSIE   Misc: Avalanche effect | Hash collision | Hash functions based on block ciphers
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | machines}}

It produces:

Cipher machines
v  d  e
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex
Mechanical: Bazeries cylinder | C-36 | C-52 | CD-57 | Cipher disk | HC-9 | Kryha | Jefferson disk | M-94 | M-209 | Reihenschieber | Scytale
Teleprinter: 5-UCO | BID 770 | KW-26 | KW-37 | Lorenz SZ 40/42 | Siemens and Halske T52
Secure voice: KY-3 | KY-57 | KY-58 | KY-68 | OMNI | SIGSALY | STE | STU-II | STU-III | VINSON | SCIP | Sectéra Secure Module
Miscellaneous: Cryptex | JADE | KG-84 | KL-43 | Noreen | PURPLE | Pinwheel | Rockex
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers


[edit] {{Crypto navbox | classical}}

It produces:

Classical cryptography
v  d  e
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex
Ciphers: ADFGVX | Affine | Alberti | Atbash | Autokey | Bifid | Book | Caesar | Four-square | Hill | Keyword | Nihilist | Permutation | Pigpen | Playfair | Polyalphabetic | Polybius | Rail Fence | Reihenschieber | Reservehandverfahren | ROT13 | Running key | Scytale | Solitaire | Straddling checkerboard | Substitution | Tap Code | Transposition | Trifid | Two-square | VIC cipher | Vigenère
Cryptanalysis: Frequency analysis | Index of coincidence
Misc: Cryptogram | Bacon | Polybius square | Scytale | Straddling checkerboard | Tabula recta
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers



[edit] Discontinued navigational templates

Here are links to the old templates that we should not use any more. During the transition to the new templates these old templates transcludes in the new ones. Thus pages that use the old ones will look right imediately.


 

In other languages