Wikipedia:WikiReader/Cryptography/todo

From Wikipedia, the free encyclopedia

Contents

[edit] To-do lists for WikiReader Cryptography articles

[edit] Advanced Encryption Standard (Talk)

Visit this to-do list

None listed.

[edit] Alan Turing (Talk)

Visit this to-do list
  • None listed.

[edit] Asymmetric key algorithm (Talk)

Visit this to-do list

None listed.

[edit] Block cipher (Talk)

Visit this to-do list
  • Describe some of the generic attacks on block ciphers

[edit] Block cipher modes of operation (Talk)

Visit this to-do list

None listed.

[edit] Blowfish (cipher) (Talk)

Visit this to-do list

Talk:Blowfish (cipher)/to do

[edit] Brute force attack (Talk)

Visit this to-do list
  • Discussion of TWINKLE and TWIRL
  • Add an overview of suggested hardware designs for key search.
  • Discuss hash collision search; MD5CRK
  • Discuss Time-memory tradeoffs
  • Briefly survey the cracking challenges (RC5, DES etc)
  • Types of attacks

[edit] Caesar cipher (Talk)

Visit this to-do list

Provide thorough in-line citations.

[edit] Certificate authority (Talk)

Visit this to-do list
  • List some important CAs

SSL CAs: Verisign, GeoTrust, Thawte, Cybertrust, DigiCert, Comodo, Entrust.net, GlobalSign, SecureTrust/Xramp, GoDaddy

Random sampling of Certification Service Providers (CSP):

  • Austria: A-Trust
  • Belgium: Certipost
  • Brasil: Unicert
  • France: Keynectis, Certinomis
  • Germany: TC-Trustcenter, Telekom, Deutsche Post
  • Holland: DigiNotar
  • Hong Kong: Digisign, Hongkong Post
  • India: Tata
  • Italy: Postecert, Actalis
  • Poland: Certum
  • Spain: Catcert, Izenpe, ACCV, IPSca
  • Switzerland: QuoVadis (also Bermuda), Swisscom, Swisssign
  • Tunisia: ANCE
  • UAE: Etisalat
  • UK: Trustis

-- Cryptoki 01:25, 21 February 2007 (UTC)

[edit] Classical cipher (Talk)

Visit this to-do list

None listed.

[edit] Claude E. Shannon (Talk)

Visit this to-do list

None listed.

[edit] Code (cryptography) (Talk)

Visit this to-do list
  • Illustrate

[edit] Colossus computer (Talk)

Visit this to-do list
  • Describe difference between Mk I and Mk II
  • Describe some of the attacks that the Colossus was used for
  • Describe the physical layout of the machine (M-rack, W-Rack, S-Rack etc); other physical components (printer, counter)
  • Describe logical architecture

[edit] Cryptanalysis (Talk)

Visit this to-do list

Empty.

[edit] Cryptanalysis of the Enigma (Talk)

Visit this to-do list
  • Add inline references
  • Describe the other Bombes (we currently mention the Polish Bomba)
  • Mention the Cyclometer and detail on how Poles used cycle structure / group theory to attack Enigma
  • Illustrate the importance of all this effort with some concrete military gains from all this effort (currently only some failures are listed)
  • Mention Zygalski / Jefferson sheets
  • Mention Banburismus procedure
  • Describe cryptanalysis of commercial/non-steckered Enigma (rodding etc)
  • Describe OP-20-G's contribution

[edit] Cryptographic hash function (Talk)

Visit this to-do list
  • Terminology; a lot of alternative names for the crypto properties and functions which hold them; distinction between Keyed and unkeyed hash functions (stick to unkeyed here);
  • Discussion of the "Merkle-Damgård structure" that MD4/5, SHA etc follow; a diagram would be appropriate.
  • Hash functions constructed from block ciphers - Davies-Meyer etc. (Applied Cryptography goes into detail on these)
  • Hash functions used to construct other primitives; e.g. block ciphers from hash functions (e.g. SHACAL, BEAR and LION), stream ciphers (SEAL), MACs from hash functions (HMAC) and PRNGs.
  • Discuss recommended sizes for hash functions; quantify "hard", MD5CRK. Perhaps mention the birthday paradox?
  • Provide a little detail about specific, popular hash functions
  • Give an example of Yuval's collision attack on signing hashed messages.
  • History?
  • regarding this statement in the article, " Therefore, Alice writes down her solution, appends a random nonce, computes its hash and tells Bob the hash value (whilst keeping the solution secret)." Please clarify if Alice gives Bob the nonce in addition to the hash.
  • Discuss reverse lookup tables (such as http://md5.crysm.net/)

[edit] Cryptographic protocol (Talk)

Visit this to-do list

None listed.

[edit] Cryptography (Talk)

Visit this to-do list
  • Give an overview of cryptography standards: at least, what they are and some important examples.
  • Wikilink to a few of the most popular protocols, e.g., Secure Sockets Layer in the "Cryptographic protocols" section.

[edit] Data Encryption Standard (Talk)

Visit this to-do list

None listed.

[edit] Differential cryptanalysis (Talk)

Visit this to-do list

None listed.

[edit] Diffie-Hellman key exchange (Talk)

Visit this to-do list

Empty.

[edit] Digital Signature Algorithm (Talk)

Visit this to-do list
  • Describe initial criticism of the standard
  • Describe Schnoor's claims of patent infringement

[edit] Digital signature (Talk)

Visit this to-do list
  • Describe cryptanalysis of digital signatures -- what are the various notions of security for a signature scheme?
  • Mention the common association of message encryption with digital signatures.

[edit] Elliptic curve cryptography (Talk)

Visit this to-do list

[edit] Encryption (Talk)

Visit this to-do list
  • Revamp taxonomy diagram
  • Illustrate general process of both public and private-key encryption.

[edit] Enigma machine (Talk)

Visit this to-do list
  • Overview the various indicator procedures (now covered: pre WW2 procedure and WW2 wehrmacht/luftwaffe) Any other know procedure welcome
  • Expand subsections on Enigma components in "Description" section
  • Add inline references

[edit] Export of cryptography (Talk)

Visit this to-do list
  • At the beginning of the article, Explain exactly what "Export of cryptography" is, as the article currently starts out explaining the reasons for its control.

[edit] Frequency analysis (Talk)

Visit this to-do list

None.

[edit] Government Communications Headquarters (Talk)

Visit this to-do list
  • Add some history of GC&CS (which redirects here)
  • Expand on dispute over trade union membership - more information is available on the GCHQ website

[edit] HMAC (Talk)

Visit this to-do list
  • Describe the actual construction.
  • Describe how the security of HMAC relates to the underlying hash function.
  • Describe the advantages of using HMAC over the underlying hash.

[edit] History of cryptography (Talk)

Visit this to-do list
  • Illustrate. (Should be easy enough to find various pictures from more specific articles).

[edit] International Data Encryption Algorithm (Talk)

Visit this to-do list
  • Describe the half-round and the key schedule.

[edit] Kerberos (protocol) (Talk)

Visit this to-do list

None listed.

[edit] Key (cryptography) (Talk)

Visit this to-do list
  • Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.

[edit] Key management (Talk)

Visit this to-do list

Empty.

[edit] Key size (Talk)

Visit this to-do list

None listed.

[edit] Linear cryptanalysis (Talk)

Visit this to-do list
  • Describe the statistical effect of a linear approximation.
  • Describe how a bias can be used to recover a subkey.
  • Discuss how characteristics can be used to find good linear approximations over several rounds.
  • Provide a diagram

[edit] M-209 (Talk)

Visit this to-do list

None listed.

[edit] MD5 (Talk)

Visit this to-do list

[edit] Message authentication code (Talk)

Visit this to-do list

None listed.

[edit] National Security Agency (Talk)

Visit this to-do list

[edit] One-time pad (Talk)

Visit this to-do list
  • A worked example of a one-time pad is needed, showing how two different pads can be used to decrypt a ciphertext into contradictory plaintexts.
  • The history of the invention of the one-time pad
  • An explanation of why, when hearing that a piece of encryption software uses a "one-time pad", most cryptographers burst into peals of hysterical laughter (cf. Snake oil (cryptography).
  • Maybe instructions on how to make a pad by hand

[edit] PURPLE (Talk)

Visit this to-do list
  • Full image?

[edit] Plaintext (Talk)

Visit this to-do list

(Empty)

[edit] Playfair cipher (Talk)

Visit this to-do list

Hello

The example used needs to be changed, because usually the letter removed from the box is the letter "J", not the "Q" as is done in the example.

Now:

P L A Y F
I R E X M
B C D G H
J K N O S
T U V W Z

sugested:

P L A Y F
I R E X M
B C D G H
K N O Q S
T U V W Z

If change is done, the example section will be:


[edit] Example

Using "playfair example" as the key, the table becomes:

P L A Y F
I R E X M
B C D G H
K N O Q S
T U V W Z

Encrypting the message "Hide the gold in the tree stump":

HI DE TH EG OL DI NT HE TR EX ES TU MP
                            ^
  1. The pair HI forms a rectangle, replace it with BM
  2. The pair DE is in a column, replace it with OD
  3. The pair TH forms a rectangle, replace it with ZB
  4. The pair EG forms a rectangle, replace it with XD
  5. The pair OL forms a rectangle, replace it with NA
  6. The pair DI forms a rectangle, replace it with BE
  7. The pair NT forms a rectangle, replace it with KU
  8. The pair HE forms a rectangle, replace it with DM
  9. The pair TR forms a rectangle, replace it with UI
  10. The pair EX (X inserted to split EE) is in a row, replace it with XM
  11. The pair ES forms a rectangle, replace it with MO
  12. The pair TU is in a row, replace it with UV
  13. The pair MP forms a rectangle, replace it with IF


BM OD ZB XD NA BE KU DM UI XM MO UV IF

Thus the message "Hide the gold in the tree stump" becomes "BMODZBXDNABEKUDMUIXMMOUVIF".

[edit] Polyalphabetic cipher (Talk)

Visit this to-do list

[edit] Pretty Good Privacy (Talk)

Visit this to-do list
  • Split article into:
  • History and license.
  • Clean tech article.
  • Add a screenshot of some PGP GUI
  • Explain that a Fingerprint in PGP terms is like a 'hash' of the public key, useful for verifying you have the correct public key without having to read the entire public key over the phone(etc).

[edit] Public key infrastructure (Talk)

Visit this to-do list
  • Add some diagrams, maybe something like [1], [2], [3]?

If you wish, you may use the material at [4] for this - we've tried to make it "non-sales" literature, and we can grant use of it to Wikipedia. - Ppatters 19:55, 31 December 2006 (UTC)

[edit] Public-key cryptography (Talk)

Visit this to-do list

Images

[edit] Quantum cryptography (Talk)

Visit this to-do list
  • Illustrate with diagrams [5], [6] and maybe photos of a QC setup
  • Add references to survey important results in the literature
  • Re-write article; make sure that it deals with quantum crytography
  • Mention quantum teleportation as another way of transporting information (mention pros and cons)

[edit] RC4 (Talk)

Visit this to-do list

None listed.

[edit] RC5 (Talk)

Visit this to-do list
  • Create an infobox
  • Provide an overview of the literature on RC5 cryptanalysis
  • Describe the main algorithm and the key schedule

[edit] ROT13 (Talk)

Visit this to-do list

Empty.

[edit] RSA (Talk)

Visit this to-do list
  • A rigorous and correct treatment of padding is essential for this article to avoid being misleading.
  • In the paragraph "Security", I think the figure 1999 must be reviewed.

[edit] Rotor machine (Talk)

Visit this to-do list
  • Add a diagram, maybe something similar to Image:Enigma-action.png but without the reflector.
  • Add some photos of various rotor machines (there are a few on the various specific pages)
  • Write a section on the cryptanalysis of rotor machines

[edit] SHA family (Talk)

Visit this to-do list

Empty.

[edit] Secret sharing (Talk)

Visit this to-do list
  • Add illustration for Shamir's scheme (maybe something like [7])
  • Add illustration for Blakley's scheme (maybe something like [8])
  • Explain "Why is trivial secret sharing not good enough?"
  • Expand or merge sections to avoid one-paragraph-section syndrome
  • Rework "limitations of secret sharing schemes" section to be more rigorous

[edit] Secure channel (Talk)

Visit this to-do list

None listed.

[edit] Secure shell (Talk)

Visit this to-do list

None listed.

[edit] Side channel attack (Talk)

Visit this to-do list

None listed.

[edit] Snake oil (cryptography) (Talk)

Visit this to-do list
  • Fix bullet point format
  • Resolve NPOV discussion

[edit] Stream cipher (Talk)

Visit this to-do list
  • Add a simple diagram of synchronous stream cipher operation vs asynchronous
  • Mention Shrinking generator, Self-shrinking generator
  • Discuss use of LFSRs in stream ciphers (non-linear combining function; non-linear filtering; clocked LFSRs)
  • Discuss relationship with OTP/Vernam cipher

[edit] Substitution box (Talk)

Visit this to-do list

Empty.

[edit] Substitution cipher (Talk)

Visit this to-do list

[edit] Transport Layer Security (Talk)

Visit this to-do list

Empty.

[edit] Transport Layer Security (Talk)

Visit this to-do list

Empty.

[edit] Transposition cipher (Talk)

Visit this to-do list

None listed.

[edit] Ultra (Talk)

Visit this to-do list

[edit] Vigenère cipher (Talk)

Visit this to-do list
  • Fix and add to External links
  • Describe relationship to the Simple XOR cipher and One-time pad
  • Describe Vigenère's version of the cipher in greater detail
  • Describe how Babbage broke Vigenere's cipher in greater detail

[edit] Virtual private network (Talk)

Visit this to-do list

Talk:Virtual private network/to do

[edit] Voynich manuscript (Talk)

Visit this to-do list

None listed.

[edit] William F. Friedman (Talk)

Visit this to-do list

None listed.

[edit] Zimmermann Telegram (Talk)

Visit this to-do list
  • There needs to be something adressing the allegations that the telegram was actually a forgery by British Intelligence to stir up USA opinion against Germany. -- Infrogmation 06:18 17 May 2003 (UTC)
  • It would be nice to have a description of the code that was used (and, ideally, how it was broken). Was it a simple word-substitution code?
  • Find out whether this "WRMEA" is anything other than a bunch of kooks, and whether this "Zionist plot" has any legs