Wikipedia:WikiReader/Cryptography/todo

From Wikipedia, the free encyclopedia

Contents

[edit] To-do lists for WikiReader Cryptography articles

[edit] Advanced Encryption Standard (Talk)

Visit this to-do list

None listed.

[edit] Alan Turing (Talk)

Visit this to-do list
  • None listed.

[edit] Asymmetric key algorithm (Talk)

Visit this to-do list

None listed.

[edit] Block cipher (Talk)

Visit this to-do list
  • Describe some of the generic attacks on block ciphers
  • Provide introductory information on Block Ciphers that explain it without the use of detailed terminology (introduce block ciphers to those new to this subject)

[edit] Block cipher modes of operation (Talk)

Visit this to-do list

None listed.

[edit] Blowfish (cipher) (Talk)

Visit this to-do list

Talk:Blowfish (cipher)/to do

[edit] Brute force attack (Talk)

Visit this to-do list
  • Discussion of TWINKLE and TWIRL
  • Add an overview of suggested hardware designs for key search.
  • Discuss hash collision search; MD5CRK
  • Discuss Time-memory tradeoffs
  • Briefly survey the cracking challenges (RC5, DES etc)
  • Types of attacks

[edit] Caesar cipher (Talk)

Visit this to-do list

Provide thorough in-line citations.

[edit] Certificate authority (Talk)

Visit this to-do list
  • List some important CAs

SSL CAs: Verisign, GeoTrust, Thawte, Cybertrust, DigiCert, Comodo, Entrust.net, GlobalSign, SecureTrust/Xramp, GoDaddy

Random sampling of Certification Service Providers (CSP):

  • Austria: A-Trust
  • Belgium: Certipost
  • Brasil: Unicert
  • France: Keynectis, Certinomis
  • Germany: TC-Trustcenter, Telekom, Deutsche Post
  • Holland: DigiNotar
  • Hong Kong: Digisign, Hongkong Post
  • India: Tata
  • Italy: Postecert, Actalis
  • Poland: Certum
  • Spain: Catcert, Izenpe, ACCV, IPSca
  • Switzerland: QuoVadis (also Bermuda), Swisscom, Swisssign
  • Tunisia: ANCE
  • UAE: Etisalat
  • UK: Trustis

-- Cryptoki 01:25, 21 February 2007 (UTC)

[edit] Classical cipher (Talk)

Visit this to-do list

[edit] Claude E. Shannon (Talk)

Visit this to-do list

None listed.

[edit] Code (cryptography) (Talk)

Visit this to-do list
  • Illustrate

[edit] Colossus computer (Talk)

Visit this to-do list
  • Describe difference between Mk I and Mk II
  • Describe some of the attacks that the Colossus was used for
  • Describe the physical layout of the machine (M-rack, W-Rack, S-Rack etc); other physical components (printer, counter)
  • Describe logical architecture

[edit] Cryptanalysis (Talk)

Visit this to-do list

Talk:Cryptanalysis/to do

[edit] Cryptanalysis of the Enigma (Talk)

Visit this to-do list
  • Add inline references
  • Describe the other Bombes (we currently mention the Polish Bomba)
  • Mention the Cyclometer and detail on how Poles used cycle structure / group theory to attack Enigma
  • Illustrate the importance of all this effort with some concrete military gains from all this effort (currently only some failures are listed)
  • Mention Zygalski / Jefferson sheets
  • Mention Banburismus procedure
  • Describe cryptanalysis of commercial/non-steckered Enigma (rodding etc)
  • Describe OP-20-G's contribution


Change (sorry, I couldn't figure out how to make this into a new topic) I have a problem with the below sentence, specifically the link equating the "Free Zone" with Vichy France. "After the French-German armistice, the Polish Cipher Bureau continued its work in France's southern "Free Zone" (Vichy France) and in French Algeria, at constant risk of discovery and imprisonment or worse." The section title is "Between two giants". Please change this inaccuracy! 206.57.121.14 18:41, 23 October 2007 (UTC)Teresa

[edit] Cryptographic hash function (Talk)

Visit this to-do list
  • Terminology; a lot of alternative names for the crypto properties and functions which hold them; distinction between Keyed and unkeyed hash functions (stick to unkeyed here);
  • Discussion of the "Merkle-Damgård structure" that MD4/5, SHA etc follow; a diagram would be appropriate.
  • Hash functions constructed from block ciphers - Davies-Meyer etc. (Applied Cryptography goes into detail on these)
  • Hash functions used to construct other primitives; e.g. block ciphers from hash functions (e.g. SHACAL, BEAR and LION), stream ciphers (SEAL), MACs from hash functions (HMAC) and PRNGs.
  • Discuss recommended sizes for hash functions; quantify "hard", MD5CRK. Perhaps mention the birthday paradox?
  • Provide a little detail about specific, popular hash functions
  • Give an example of Yuval's collision attack on signing hashed messages.
  • History?
  • regarding this statement in the article, " Therefore, Alice writes down her solution, appends a random nonce, computes its hash and tells Bob the hash value (whilst keeping the solution secret)." Please clarify if Alice gives Bob the nonce in addition to the hash.
  • Discuss reverse lookup tables (such as http://md5.crysm.net/)

[edit] Cryptographic protocol (Talk)

Visit this to-do list

None listed.

[edit] Cryptography (Talk)

Visit this to-do list
  • Give an overview of cryptography standards: at least, what they are and some important examples.
  • Wikilink to a few of the most popular protocols, e.g., Secure Sockets Layer in the "Cryptographic protocols" section.

[edit] Data Encryption Standard (Talk)

Visit this to-do list

None listed.

[edit] Differential cryptanalysis (Talk)

Visit this to-do list

None listed.

[edit] Diffie-Hellman key exchange (Talk)

Visit this to-do list

Talk:Diffie-Hellman key exchange/to do

[edit] Digital Signature Algorithm (Talk)

Visit this to-do list
  • Describe initial criticism of the standard
  • Describe Schnoor's claims of patent infringement

[edit] Digital signature (Talk)

Visit this to-do list
  • Describe cryptanalysis of digital signatures -- what are the various notions of security for a signature scheme?
  • Mention the common association of message encryption with digital signatures.

[edit] Elliptic curve cryptography (Talk)

Visit this to-do list

[edit] Encryption (Talk)

Visit this to-do list
  • Revamp taxonomy diagram
  • Illustrate general process of both public and private-key encryption.

[edit] Enigma machine (Talk)

Visit this to-do list
  • Overview the various indicator procedures (now covered: pre WW2 procedure and WW2 wehrmacht/luftwaffe) Any other know procedure welcome
  • Expand subsections on Enigma components in "Description" section
  • Add inline references

[edit] Export of cryptography (Talk)

Visit this to-do list
  • At the beginning of the article, Explain exactly what "Export of cryptography" is, as the article currently starts out explaining the reasons for its control. Done.

[edit] Frequency analysis (Talk)

Visit this to-do list

Talk:Frequency analysis/to do

[edit] Government Communications Headquarters (Talk)

Visit this to-do list
  • Add some history of GC&CS (which redirects here)
  • Expand on dispute over trade union membership - more information is available on the GCHQ website

[edit] HMAC (Talk)

Visit this to-do list
  • Describe the actual construction.
  • Describe how the security of HMAC relates to the underlying hash function.
  • Describe the advantages of using HMAC over the underlying hash.

[edit] History of cryptography (Talk)

Visit this to-do list
  • Illustrate. (Should be easy enough to find various pictures from more specific articles).

[edit] International Data Encryption Algorithm (Talk)

Visit this to-do list
  • Describe the half-round and the key schedule.

[edit] Kerberos (protocol) (Talk)

Visit this to-do list

None listed.

[edit] Key (cryptography) (Talk)

Visit this to-do list
  • Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.

[edit] Key management (Talk)

Visit this to-do list

Talk:Key management/to do

[edit] Key size (Talk)

Visit this to-do list

None listed.

[edit] Linear cryptanalysis (Talk)

Visit this to-do list
  • Describe the statistical effect of a linear approximation.
  • Describe how a bias can be used to recover a subkey.
  • Discuss how characteristics can be used to find good linear approximations over several rounds.
  • Provide a diagram

[edit] M-209 (Talk)

Visit this to-do list

None listed.

[edit] MD5 (Talk)

Visit this to-do list

[edit] Message authentication code (Talk)

Visit this to-do list

Talk:Message Authentication Code/to do

[edit] National Security Agency (Talk)

Visit this to-do list
  • make sure redirect thing is working or the notice is changed. (see discussion below)

[edit] One-time pad (Talk)

Visit this to-do list
  • A worked example of a one-time pad is needed, showing how two different pads can be used to decrypt a ciphertext into contradictory plaintexts.
  • The history of the invention of the one-time pad
  • An explanation of why, when hearing that a piece of encryption software uses a "one-time pad", most cryptographers burst into peals of hysterical laughter (cf. Snake oil (cryptography).
  • Maybe instructions on how to make a pad by hand

[edit] PURPLE (Talk)

Visit this to-do list
  • Full image?

[edit] Plaintext (Talk)

Visit this to-do list

(Empty)

[edit] Playfair cipher (Talk)

Visit this to-do list

Hello

The example used needs to be changed, because usually the letter removed from the box is the letter "J", not the "Q" as is done in the example.

Now:

P L A Y F
I R E X M
B C D G H
J K N O S
T U V W Z

sugested:

P L A Y F
I R E X M
B C D G H
K N O Q S
T U V W Z

If change is done, the example section will be:


[edit] Example

Using "playfair example" as the key, the table becomes:

P L A Y F
I R E X M
B C D G H
K N O Q S
T U V W Z

Encrypting the message "Hide the gold in the tree stump":

HI DE TH EG OL DI NT HE TR EX ES TU MP
                            ^
  1. The pair HI forms a rectangle, replace it with BM
  2. The pair DE is in a column, replace it with OD
  3. The pair TH forms a rectangle, replace it with ZB
  4. The pair EG forms a rectangle, replace it with XD
  5. The pair OL forms a rectangle, replace it with NA
  6. The pair DI forms a rectangle, replace it with BE
  7. The pair NT forms a rectangle, replace it with KU
  8. The pair HE forms a rectangle, replace it with DM
  9. The pair TR forms a rectangle, replace it with UI
  10. The pair EX (X inserted to split EE) is in a row, replace it with XM
  11. The pair ES forms a rectangle, replace it with MO
  12. The pair TU is in a row, replace it with UV
  13. The pair MP forms a rectangle, replace it with IF


BM OD ZB XD NA BE KU DM UI XM MO UV IF

Thus the message "Hide the gold in the tree stump" becomes "BMODZBXDNABEKUDMUIXMMOUVIF".

[edit] Polyalphabetic cipher (Talk)

Visit this to-do list

[edit] Pretty Good Privacy (Talk)

Visit this to-do list
  • Split article into:
  • History and license.
  • Clean tech article.
  • Add a screenshot of some PGP GUI
  • Explain that a public-key fingerprint in PGP terms is like a 'hash' of the public key, useful for verifying you have the correct public key without having to read the entire public key over the phone(etc).

[edit] Public key infrastructure (Talk)

Visit this to-do list
  • The diagram makes mention of Registraion Authority (RA), but the actual wiki content does not. Can anyone fill this gap?
  • Add some diagrams, maybe something like [1], [2], [3]?

If you wish, you may use the material at [4] for this - we've tried to make it "non-sales" literature, and we can grant use of it to Wikipedia. - Ppatters 19:55, 31 December 2006 (UTC)

[edit] Public-key cryptography (Talk)

Visit this to-do list

Images

[edit] Quantum cryptography (Talk)

Visit this to-do list
  • Re-write Entanglement section
  • Clean up Attacks section - cite security proofs
  • Add references to important results in the literature
  • Illustrate with diagrams [5], [6] and maybe photos of a QC setup

[edit] RC4 (Talk)

Visit this to-do list

None listed.

[edit] RC5 (Talk)

Visit this to-do list
  • Create an infobox
  • Provide an overview of the literature on RC5 cryptanalysis
  • Describe the main algorithm and the key schedule

[edit] ROT13 (Talk)

Visit this to-do list

Talk:ROT13/to do

[edit] RSA (Talk)

Visit this to-do list
  • A rigorous and correct treatment of padding is essential for this article to avoid being misleading.
  • In the paragraph "Security", I think the figure 1999 must be reviewed.
  • It should be reviewed whether a 256 bit key can be factored in hours on a personal computer. I can factor them in minutes on my (somewhat old) machine.

[edit] Rotor machine (Talk)

Visit this to-do list
  • Add a diagram, maybe something similar to Image:Enigma-action.png but without the reflector.
  • Add some photos of various rotor machines (there are a few on the various specific pages)
  • Write a section on the cryptanalysis of rotor machines

[edit] SHA family (Talk)

Visit this to-do list

Talk:SHA family/to do

[edit] Secret sharing (Talk)

Visit this to-do list
  • Add illustration for Shamir's scheme (maybe something like [7])
  • Add illustration for Blakley's scheme (maybe something like [8])
  • Explain "Why is trivial secret sharing not good enough?"
  • Expand or merge sections to avoid one-paragraph-section syndrome
  • Rework "limitations of secret sharing schemes" section to be more rigorous

[edit] Secure channel (Talk)

Visit this to-do list

None listed.

[edit] Secure shell (Talk)

Visit this to-do list

None listed.

[edit] Side channel attack (Talk)

Visit this to-do list

None listed.

[edit] Snake oil (cryptography) (Talk)

Visit this to-do list
  • Fix bullet point format
  • Resolve NPOV discussion

[edit] Stream cipher (Talk)

Visit this to-do list
  • Add a simple diagram of synchronous stream cipher operation vs asynchronous
  • Mention Shrinking generator, Self-shrinking generator
  • Discuss use of LFSRs in stream ciphers (non-linear combining function; non-linear filtering; clocked LFSRs)
  • Discuss relationship with OTP/Vernam cipher

[edit] Substitution box (Talk)

Visit this to-do list

Talk:Substitution box/to do

[edit] Substitution cipher (Talk)

Visit this to-do list

Remove the "f*** you b******"

[edit] Transport Layer Security (Talk)

Visit this to-do list

Talk:Transport Layer Security/to do


[edit] Transposition cipher (Talk)

Visit this to-do list

None listed.

[edit] Ultra (Talk)

Visit this to-do list

[edit] Vigenère cipher (Talk)

Visit this to-do list
  • Fix and add to External links
  • Describe relationship to the Simple XOR cipher and One-time pad
  • Describe Vigenère's version of the cipher in greater detail
  • Describe how Babbage broke Vigenere's cipher in greater detail

[edit] Virtual private network (Talk)

Visit this to-do list

Talk:Virtual private network/to do

[edit] Voynich manuscript (Talk)

Visit this to-do list

None listed.

[edit] William F. Friedman (Talk)

Visit this to-do list

None listed.

[edit] Zimmermann Telegram (Talk)

Visit this to-do list
  • It would be nice to have a description of the code that was used (and, ideally, how it was broken). Was it a simple word-substitution code?
  • Something should be added about Japan's relationship to Germany and to Mexico at this point in time - additionally, information about their response should be added. --Tim4christ17 talk 21:57, 17 July 2007 (UTC)