Wikipedia:WikiReader/Cryptography/Phase II

From Wikipedia, the free encyclopedia

WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography on Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.

[edit] Phase II archive

[edit] Locating cryptography articles

Here are some starting points for finding cryptography articles on Wikipedia.

[edit] Proposed Table of contents (68 articles)

  1. General concepts
    1. Cryptography
    2. Cryptanalysis
    3. Plaintext
    4. Encryption
    5. Key (cryptography)
    6. Code (cryptography)
    7. Secure channel
    8. Brute force attack
    9. Key size
    10. Cryptographic protocol
  2. History of cryptography
    1. History of cryptography
    2. Classical cryptography
      1. Classical cipher
      2. Substitution cipher
      3. Transposition cipher
      4. Frequency analysis
      5. Vigenere
      6. Playfair cipher
      7. Caesar cipher
      8. Polyalphabetic cipher
    3. Rotor machines, WWII-era
      1. Rotor machine
      2. Enigma machine
      3. Purple code
      4. Colossus computer
      5. ULTRA
      6. Alan Turing
      7. One-time pad
      8. Claude Shannon
      9. William Friedman
    4. Other
    5. Export of cryptography
    6. NSA
    7. GCHQ
  3. Symmetric key cryptography
    1. Symmetric Encryption
      1. Block cipher
      2. Data Encryption Standard
      3. Advanced Encryption Standard
      4. RC5
      5. IDEA
      6. Blowfish (cipher)
      7. Stream cipher
      8. RC4 (cipher)
      9. S-box
      10. Block cipher modes of operation
      11. Linear cryptanalysis
      12. Differential cryptanalysis
    2. Hash functions
      1. Cryptographic hash function
      2. MD5
      3. SHA-1
      4. Message authentication code
      5. HMAC
  4. Asymmetric key cryptography
    1. Asymmetric key algorithm
    2. Public-key cryptography
    3. RSA
    4. Digital signature
    5. Pretty Good Privacy
    6. Diffie-Hellman key exchange
    7. El Gamal
    8. Digital Signature Algorithm
    9. PKI
    10. Certificate authority
    11. Key management
    12. Elliptic curve cryptography
  5. Misc
    1. Quantum cryptography
    2. Secure Sockets Layer
    3. VPN
    4. SSH
    5. Secret sharing
    6. ROT13
    7. Secure Sockets Layer
    8. Side channel attack

[edit] Survey

Here is a summary of the articles currently under consideration and various editors' evaluations of them (using a slightly over-complex numerical rating scheme!) Feel free to add your own suggestions, comments and ratings.

The meaning of the scores is as follows:
"Include?": a score indicating your judgment about whether to include this article (after the appropriate improvements have been made).

  • 0 — we must not include this article
  • 5 — I am ambivalent about the inclusion of this article
  • 10 — we must include this article

"Completeness?": a score indicating your judgment about how much work is necessary before the article is suitable for inclusion.

  • 0 — article must be written from scratch
  • 5 — there is a moderate amount of work to be done
  • 10 — article is ready as it stands
Article Discussion Include? Completeness Signature
Advanced Encryption Standard #Advanced Encryption Standard 8 2 — Matt 00:53, 14 Jul 2004 (UTC)
Asymmetric key algorithm #Asymmetric key algorithm 9 7 — Matt 01:19, 14 Jul 2004 (UTC)
Block cipher #Block cipher 8 8 — Matt 00:53, 14 Jul 2004 (UTC)
Colossus computer #Colossus computer 7 4 — Matt 01:35, 18 Jul 2004 (UTC)
Code (cryptography) #Code (cryptography) 9 7 — Matt 01:20, 18 Jul 2004 (UTC)
Cryptanalysis #Cryptanalysis 10 9 — Matt 16:04, 24 Jun 2004 (UTC)
Cryptographic hash function #Cryptographic hash function 8 7 — Matt 01:11, 14 Jul 2004 (UTC)
Cryptography #Cryptography 10 8 — Matt 16:04, 24 Jun 2004 (UTC)
Data Encryption Standard #Data Encryption Standard 8 7 — Matt 16:16, 24 Jun 2004 (UTC)
Diffie-Hellman key exchange #Diffie-Hellman key exchange 7 5 Fuzheado Talk 06:20, 14 Jul 2004 (UTC)
Diffie-Hellman key exchange #Diffie-Hellman key exchange 7 7 — Matt 06:36, 14 Jul 2004 (UTC)
Digital signature #Digital signature 8 9 — Matt 01:03, 14 Jul 2004 (UTC)
Encryption #Encryption 10 5 — Matt 01:20, 18 Jul 2004 (UTC)
Enigma machine #Enigma machine 9 3 — Matt 19:22, 24 Jun 2004 (UTC)
Frequency analysis #Frequency analysis 7 7 — Matt 01:02, 14 Jul 2004 (UTC)
History of cryptography #History of cryptography 9 5 — Matt 18:52, 24 Jun 2004 (UTC)
Key (cryptography) #Key (cryptography) 9 9 — Matt 01:23, 14 Jul 2004 (UTC)
MD5 #MD5 8 3 — Matt 01:11, 14 Jul 2004 (UTC)
Message authentication code #Message authentication code 7 2 — Matt 01:18, 14 Jul 2004 (UTC)
One-time pad #One-time pad 5 5 [[User:Poccil|Peter O. (Talk)]] 03:55, Jul 7, 2004 (UTC)
" " 8 8 — Matt 00:41, 14 Jul 2004 (UTC)
Plaintext #Plaintext 7 8 — Matt 22:39, 17 Jul 2004 (UTC)
Pretty Good Privacy #Pretty Good Privacy 8 6 — Matt 19:17, 24 Jun 2004 (UTC)
Public-key cryptography #Public-key cryptography 9 3 — Matt 18:57, 24 Jun 2004 (UTC)
Purple code #Purple code 5 5 — Matt 03:49, 14 Jul 2004 (UTC)
Quantum cryptography #Quantum cryptography 8 3
RC4 (cipher) #RC4 (cipher) 8 8 — Matt 00:38, 14 Jul 2004 (UTC)
RSA #RSA 9 6 — Matt 19:06, 24 Jun 2004 (UTC)
ROT13 #ROT13 7 9 — Matt 17:01, 17 Jul 2004 (UTC)
Rotor machine #Rotor machine 7 2 — Matt 01:35, 18 Jul 2004 (UTC)
Secret sharing #Secret sharing 2 9 — Matt 00:45, 14 Jul 2004 (UTC)
Secure channel #Secure channel 3 6 — Matt 20:08, 24 Jun 2004 (UTC)
Secure shell #Secure shell - - David Remahl 01:35, 14 Jul 2004 (UTC)
" " 6 2 — Matt 01:39, 14 Jul 2004 (UTC)
Secure Sockets Layer #Secure Sockets Layer - - David Remahl 01:35, 14 Jul 2004 (UTC)
" " 8 6 — Matt 01:39, 14 Jul 2004 (UTC)
SHA-1 #SHA-1 6 5 — Matt 01:15, 14 Jul 2004 (UTC)
Stream cipher #Stream cipher 8 3 — Matt 00:53, 14 Jul 2004 (UTC)
Substitution cipher #Substitution cipher 9 9 — Matt 19:46, 24 Jun 2004 (UTC)
Transposition cipher #Transposition cipher 9 9 — Matt 04:03, 14 Jul 2004 (UTC)
Ultra #Ultra 6 4 — Matt 01:35, 18 Jul 2004 (UTC)
Vigenère #Vigenère 7 9 — Matt 04:05, 14 Jul 2004 (UTC)
VPN #VPN - - David Remahl 01:35, 14 Jul 2004 (UTC)
" " 4 3 — Matt 01:39, 14 Jul 2004 (UTC)

[edit] Discussion about individual articles

[edit] Advanced Encryption Standard

  • Lots to add, probably should merge with Rijndael since the two are virtually synonymous. — Matt 01:06, 14 Jul 2004 (UTC)

[edit] Asymmetric key algorithm

[edit] Block cipher

[edit] Cryptanalysis

[edit] Cryptographic hash function

[edit] Cryptography

  • Currently is essentially a collection of pointers to other articles. This article is likely to be the 'intro' for the reader, and should provide more context (to help the Average Reader) than it currently does. There is some history on what might be needed to do so in Talk. (ww)

[edit] Data Encryption Standard

  • One of the diagrams needs IP changing to FP; I'd like to add a few details and a timeline too. — Matt 16:16, 24 Jun 2004 (UTC)

[edit] Digital signature

[edit] Enigma machine

  • Needs the Ultra material moving into Ultra, and replacing with maybe a single paragraph. Might need more diagrams and photos of components. The basic cryptanalysis section is also too wordy and covered elsewhere. Enigma is a complex story; we need to work hard to provide a decent overview. — Matt 03:10, 25 Jun 2004 (UTC)
  • jwr made some very cogent comments about this article in Talk. They are a very reasonable starting point for improvements for the Average Reader and were solicited for just that reason. It is so complex a story that this is likely (even with changes) to be one of the Reader's longer articles. This is not necessarily a bad thing, as it will demonstrate several things at once and so serve double or triple or ... duty in the Reader. (ww)

[edit] Frequency analysis

  • Would benefit from a graph or two, and maybe a worked example. — Matt 01:02, 14 Jul 2004 (UTC)

[edit] History of cryptography

  • Needs a lead section; references; timeline; some structuring; mention of quantum cryptography — Matt 18:52, 24 Jun 2004 (UTC)
  • Timeline is nearly complete. Only a little more work required. See Talk. As a separate article, this does need some work. It's presetn form is essentially the history parts of any earlier version of cryptography. Several bits here were linked conceptually and explicationally to parts which were left behind. In particular, some discussion is needed of purposes for crypto. (ww)

[edit] Key (cryptography)

[edit] MD5

  • Lots needed: description of the algorithm, popular applicaitions, and detail of the cryptanalysis — Matt 01:11, 14 Jul 2004 (UTC)

[edit] Message authentication code

[edit] One-time pad

[edit] Pretty Good Privacy

  • Almost made it to featured status just recently. Has been gone over by a participant in the development process (Jon) and is factually accurate. Many edits made for clarity while up for FA status and little remains to be done. (ww)

[edit] Public-key cryptography

[edit] Purple code

[edit] Quantum cryptography

  • Quite interesting for a general reader, and increasingly topical. Quite technical though; the article could use a diagram to illustrate the key-exchange protocol.

[edit] RC4 (cipher)

[edit] RSA

  • The "operation" section could do with some more wordiness; there's a lot of maths at the moment, and this article is on a topic likely to be interesting and important to non-technical readers. — Matt 19:06, 24 Jun 2004 (UTC)

[edit] ROT13

  • I'm not sure where to suggest including an article, but I liked Rot13. It's interesting and accessible to the layman, and somewhat humorous as well. Isomorphic 03:23, 17 Jul 2004 (UTC) (copied from Talk:)

[edit] Secure channel

  • Useful as brief coverage of a central problem in secure communication and the reason why cryptography is needed at all. ww 18:11, 13 Jul 2004 (UTC)

[edit] Secret sharing

  • In most respects, just about right for the Average Reader, as an example of an advanced protocol and what can be achieved by cryptographic primitive operations when combined with such a protocol. See the Talk page for discussion on structure and purpose. (ww)

[edit] SHA-1

[edit] Stream cipher

[edit] Substitution cipher

  • Just some formatting tweaks, I think. — Matt 19:47, 24 Jun 2004 (UTC)
  • Long, but not too long, given the centrality of topic for crypto. See comments on this article in the /featured section on the Project Crytpography page. (ww)

[edit] Transposition cipher

[edit] Vigenère

[edit] VPN