Wikipedia:WikiReader/Cryptography/todo
From Wikipedia, the free encyclopedia
[edit] To-do lists for WikiReader Cryptography articles
[edit] Advanced Encryption Standard (Talk)
None listed.
[edit] Alan Turing (Talk)
- None listed.
[edit] Asymmetric key algorithm (Talk)
None listed.
[edit] Block cipher (Talk)
- Describe some of the generic attacks on block ciphers
- Provide introductory information on Block Ciphers that explain it without the use of detailed terminology (introduce block ciphers to those new to this subject)
[edit] Block cipher modes of operation (Talk)
None listed.
[edit] Blowfish (cipher) (Talk)
- Visit this to-do list
Talk:Blowfish (cipher)/to do
[edit] Brute force attack (Talk)
- Discussion of TWINKLE and TWIRL
- Add an overview of suggested hardware designs for key search.
- Discuss hash collision search; MD5CRK
- Discuss Time-memory tradeoffs
- Briefly survey the cracking challenges (RC5, DES etc)
- Types of attacks
[edit] Caesar cipher (Talk)
Provide thorough in-line citations.
[edit] Certificate authority (Talk)
- List some important CAs
SSL CAs: Verisign, GeoTrust, Thawte, Cybertrust, DigiCert, Comodo, Entrust.net, GlobalSign, SecureTrust/Xramp, GoDaddy
Random sampling of Certification Service Providers (CSP):
- Austria: A-Trust
- Belgium: Certipost
- Brasil: Unicert
- France: Keynectis, Certinomis
- Germany: TC-Trustcenter, Telekom, Deutsche Post
- Holland: DigiNotar
- Hong Kong: Digisign, Hongkong Post
- India: Tata
- Italy: Postecert, Actalis
- Poland: Certum
- Spain: Catcert, Izenpe, ACCV, IPSca
- Switzerland: QuoVadis (also Bermuda), Swisscom, Swisssign
- Tunisia: ANCE
- UAE: Etisalat
- UK: Trustis
-- Cryptoki 01:25, 21 February 2007 (UTC)
[edit] Classical cipher (Talk)
[edit] Claude E. Shannon (Talk)
None listed.
[edit] Code (cryptography) (Talk)
- Illustrate
[edit] Colossus computer (Talk)
- Describe difference between Mk I and Mk II
- Describe some of the attacks that the Colossus was used for
- Describe the physical layout of the machine (M-rack, W-Rack, S-Rack etc); other physical components (printer, counter)
- Describe logical architecture
[edit] Cryptanalysis (Talk)
- Visit this to-do list
Talk:Cryptanalysis/to do
[edit] Cryptanalysis of the Enigma (Talk)
- Add inline references
- Describe the other Bombes (we currently mention the Polish Bomba)
- Mention the Cyclometer and detail on how Poles used cycle structure / group theory to attack Enigma
- Illustrate the importance of all this effort with some concrete military gains from all this effort (currently only some failures are listed)
- Mention Zygalski / Jefferson sheets
- Mention Banburismus procedure
- Describe cryptanalysis of commercial/non-steckered Enigma (rodding etc)
- Describe OP-20-G's contribution
Change (sorry, I couldn't figure out how to make this into a new topic) I have a problem with the below sentence, specifically the link equating the "Free Zone" with Vichy France. "After the French-German armistice, the Polish Cipher Bureau continued its work in France's southern "Free Zone" (Vichy France) and in French Algeria, at constant risk of discovery and imprisonment or worse." The section title is "Between two giants". Please change this inaccuracy! 206.57.121.14 18:41, 23 October 2007 (UTC)Teresa
[edit] Cryptographic hash function (Talk)
- Terminology; a lot of alternative names for the crypto properties and functions which hold them; distinction between Keyed and unkeyed hash functions (stick to unkeyed here);
Discussion of the "Merkle-Damgård structure" that MD4/5, SHA etc follow; a diagram would be appropriate.Hash functions constructed from block ciphers - Davies-Meyer etc. (Applied Cryptography goes into detail on these)Hash functions used to construct other primitives; e.g. block ciphers from hash functions (e.g. SHACAL, BEAR and LION), stream ciphers (SEAL), MACs from hash functions (HMAC) and PRNGs.- Discuss recommended sizes for hash functions; quantify "hard", MD5CRK. Perhaps mention the birthday paradox?
- Provide a little detail about specific, popular hash functions
- Give an example of Yuval's collision attack on signing hashed messages.
- History?
regarding this statement in the article, " Therefore, Alice writes down her solution, appends a random nonce, computes its hash and tells Bob the hash value (whilst keeping the solution secret)." Please clarify if Alice gives Bob the nonce in addition to the hash.- Discuss reverse lookup tables (such as http://md5.crysm.net/)
[edit] Cryptographic protocol (Talk)
None listed.
[edit] Cryptography (Talk)
- Give an overview of cryptography standards: at least, what they are and some important examples.
- Wikilink to a few of the most popular protocols, e.g., Secure Sockets Layer in the "Cryptographic protocols" section.
[edit] Data Encryption Standard (Talk)
None listed.
[edit] Differential cryptanalysis (Talk)
None listed.
[edit] Diffie-Hellman key exchange (Talk)
- Visit this to-do list
Talk:Diffie-Hellman key exchange/to do
[edit] Digital Signature Algorithm (Talk)
- Describe initial criticism of the standard
- Describe Schnoor's claims of patent infringement
[edit] Digital signature (Talk)
- Describe cryptanalysis of digital signatures -- what are the various notions of security for a signature scheme?
Mention the common association of message encryption with digital signatures.
[edit] Elliptic curve cryptography (Talk)
- Please add a graph such as this one
- please organize and add an example like RSA_algorithm#Encrypting_messages
[edit] Encryption (Talk)
- Revamp taxonomy diagram
- Illustrate general process of both public and private-key encryption.
[edit] Enigma machine (Talk)
- Overview the various indicator procedures (now covered: pre WW2 procedure and WW2 wehrmacht/luftwaffe) Any other know procedure welcome
- Expand subsections on Enigma components in "Description" section
- Add inline references
[edit] Export of cryptography (Talk)
At the beginning of the article, Explain exactly what "Export of cryptography" is, as the article currently starts out explaining the reasons for its control.Done.
[edit] Frequency analysis (Talk)
- Visit this to-do list
Talk:Frequency analysis/to do
[edit] Government Communications Headquarters (Talk)
- Add some history of GC&CS (which redirects here)
- Expand on dispute over trade union membership - more information is available on the GCHQ website
[edit] HMAC (Talk)
Describe the actual construction.- Describe how the security of HMAC relates to the underlying hash function.
- Describe the advantages of using HMAC over the underlying hash.
[edit] History of cryptography (Talk)
- Illustrate. (Should be easy enough to find various pictures from more specific articles).
[edit] International Data Encryption Algorithm (Talk)
- Describe the half-round and the key schedule.
[edit] Kerberos (protocol) (Talk)
None listed.
[edit] Key (cryptography) (Talk)
- Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.
[edit] Key management (Talk)
- Visit this to-do list
Talk:Key management/to do
[edit] Key size (Talk)
None listed.
[edit] Linear cryptanalysis (Talk)
- Describe the statistical effect of a linear approximation.
- Describe how a bias can be used to recover a subkey.
- Discuss how characteristics can be used to find good linear approximations over several rounds.
- Provide a diagram
[edit] M-209 (Talk)
None listed.
[edit] MD5 (Talk)
- Summarise results of Berson
- Complete the (non-pseudocode) description of the MD5 algorithm
- Add information about the md5 collisions
- Add information about md5x one step to double md5 hashes
[edit] Message authentication code (Talk)
- Visit this to-do list
Talk:Message Authentication Code/to do
[edit] National Security Agency (Talk)
- make sure redirect thing is working or the notice is changed. (see discussion below)
[edit] One-time pad (Talk)
A worked example of a one-time pad is needed, showing how two different pads can be used to decrypt a ciphertext into contradictory plaintexts.The history of the invention of the one-time padAn explanation of why, when hearing that a piece of encryption software uses a "one-time pad", most cryptographers burst into peals of hysterical laughter (cf. Snake oil (cryptography).- Maybe instructions on how to make a pad by hand
[edit] PURPLE (Talk)
- Full image?
[edit] Plaintext (Talk)
(Empty)
[edit] Playfair cipher (Talk)
Hello
The example used needs to be changed, because usually the letter removed from the box is the letter "J", not the "Q" as is done in the example.
Now:
P L A Y F I R E X M B C D G H J K N O S T U V W Z
sugested:
P L A Y F I R E X M B C D G H K N O Q S T U V W Z
If change is done, the example section will be:
[edit] Example
Using "playfair example" as the key, the table becomes:
P L A Y F I R E X M B C D G H K N O Q S T U V W Z
Encrypting the message "Hide the gold in the tree stump":
HI DE TH EG OL DI NT HE TR EX ES TU MP ^
- The pair HI forms a rectangle, replace it with BM
- The pair DE is in a column, replace it with OD
- The pair TH forms a rectangle, replace it with ZB
- The pair EG forms a rectangle, replace it with XD
- The pair OL forms a rectangle, replace it with NA
- The pair DI forms a rectangle, replace it with BE
- The pair NT forms a rectangle, replace it with KU
- The pair HE forms a rectangle, replace it with DM
- The pair TR forms a rectangle, replace it with UI
- The pair EX (X inserted to split EE) is in a row, replace it with XM
- The pair ES forms a rectangle, replace it with MO
- The pair TU is in a row, replace it with UV
- The pair MP forms a rectangle, replace it with IF
BM OD ZB XD NA BE KU DM UI XM MO UV IF
Thus the message "Hide the gold in the tree stump" becomes "BMODZBXDNABEKUDMUIXMMOUVIF".
[edit] Polyalphabetic cipher (Talk)
- Merge items from Substitution cipher#Polyalphabetic substitution and expand.
[edit] Pretty Good Privacy (Talk)
- Split article into:
-
- History and license.
- Clean tech article.
Add a screenshot of some PGP GUI- Explain that a public-key fingerprint in PGP terms is like a 'hash' of the public key, useful for verifying you have the correct public key without having to read the entire public key over the phone(etc).
[edit] Public key infrastructure (Talk)
- The diagram makes mention of Registraion Authority (RA), but the actual wiki content does not. Can anyone fill this gap?
- Add some diagrams, maybe something like [1], [2], [3]?
If you wish, you may use the material at [4] for this - we've tried to make it "non-sales" literature, and we can grant use of it to Wikipedia. - Ppatters 19:55, 31 December 2006 (UTC)
[edit] Public-key cryptography (Talk)
Images
[edit] Quantum cryptography (Talk)
- Re-write Entanglement section
- Clean up Attacks section - cite security proofs
- Add references to important results in the literature
- Illustrate with diagrams [5], [6] and maybe photos of a QC setup
[edit] RC4 (Talk)
None listed.
[edit] RC5 (Talk)
- Create an infobox
- Provide an overview of the literature on RC5 cryptanalysis
- Describe the main algorithm and the key schedule
[edit] ROT13 (Talk)
- Visit this to-do list
Talk:ROT13/to do
[edit] RSA (Talk)
- A rigorous and correct treatment of padding is essential for this article to avoid being misleading.
- In the paragraph "Security", I think the figure 1999 must be reviewed.
- It should be reviewed whether a 256 bit key can be factored in hours on a personal computer. I can factor them in minutes on my (somewhat old) machine.
[edit] Rotor machine (Talk)
- Add a diagram, maybe something similar to Image:Enigma-action.png but without the reflector.
- Add some photos of various rotor machines (there are a few on the various specific pages)
- Write a section on the cryptanalysis of rotor machines
[edit] SHA family (Talk)
- Visit this to-do list
Talk:SHA family/to do
[edit] Secret sharing (Talk)
- Add illustration for Shamir's scheme (maybe something like [7])
- Add illustration for Blakley's scheme (maybe something like [8])
- Explain "Why is trivial secret sharing not good enough?"
- Expand or merge sections to avoid one-paragraph-section syndrome
- Rework "limitations of secret sharing schemes" section to be more rigorous
[edit] Secure channel (Talk)
None listed.
[edit] Secure shell (Talk)
None listed.
[edit] Side channel attack (Talk)
None listed.
[edit] Snake oil (cryptography) (Talk)
Fix bullet point format- Resolve NPOV discussion
[edit] Stream cipher (Talk)
- Add a simple diagram of synchronous stream cipher operation vs asynchronous
- Mention Shrinking generator, Self-shrinking generator
- Discuss use of LFSRs in stream ciphers (non-linear combining function; non-linear filtering; clocked LFSRs)
- Discuss relationship with OTP/Vernam cipher
[edit] Substitution box (Talk)
- Visit this to-do list
Talk:Substitution box/to do
[edit] Substitution cipher (Talk)
Remove the "f*** you b******"
[edit] Transport Layer Security (Talk)
- Visit this to-do list
Talk:Transport Layer Security/to do
[edit] Transposition cipher (Talk)
None listed.
[edit] Ultra (Talk)
- Merge technical codebreaking detail into Cryptanalysis of the Enigma: in progress
- Cleanup references
[edit] Vigenère cipher (Talk)
- Fix and add to External links
- Describe relationship to the Simple XOR cipher and One-time pad
- Describe Vigenère's version of the cipher in greater detail
- Describe how Babbage broke Vigenere's cipher in greater detail
[edit] Virtual private network (Talk)
- Visit this to-do list
Talk:Virtual private network/to do
[edit] Voynich manuscript (Talk)
None listed.
[edit] William F. Friedman (Talk)
None listed.
[edit] Zimmermann Telegram (Talk)
- It would be nice to have a description of the code that was used (and, ideally, how it was broken). Was it a simple word-substitution code?
- Something should be added about Japan's relationship to Germany and to Mexico at this point in time - additionally, information about their response should be added. --Tim4christ17 talk 21:57, 17 July 2007 (UTC)