Knowledge

Talk:Encryption

Source đź“ť

31: 429:
from your comment. The spelling is (cy v ci) is irrelevant as to meaning, but excites comment (see Talk:Cryptography for some history on WP). As the diagram notes, cyphers come in symmetric and asymmetric flavors, and symmetric cyphers are sometimes (confusingly) called private key cyphers. Asymmetric key cyphers are sometimes (wrongly) taken to be all public key/private key cyphers. Not all are, as there exist some in which there are no public keys.
551:, also known as one-way hashes or message digests, are used to encrypt data so that it cannot ever be decrypted, but it can be recognized because the same data always produces the same output. Other unique features of this form of encryption include that no matter the size of the input, the size of the output is always the same (the size of the output varies from algorithm to algorithm), and that no keys are used. Popular algorithms include 514:" classification, dividing the ciphers strictly according to how they function. The problem with this approach is that you then make distinctions that are never made in practice: the distinction between substitution and transposition is only really used in the context of classical ciphers; the distinction between symmetric and asymmetric ciphers is only really used in the context of modern cryptography, and so on. 191: 370: 309: 268: 151: 91: 64: 22: 935:
falsified. (A 0 could be turned into a 6 with a simple flourish of a pen, for instance.) But the advantages of zero and other Arabic numerals were not so easily dispensed with; Italian merchants continued to use them, and even used them to send encrypted messages - which is how the word 'cipher' came to mean "secret code."
627:— in my experience, most cryptographers use "encryption" to refer to the action of ciphers, so it's a good title. You've pointed out, though, that sometimes people are looking for an overview of the entire field when they search for "encryption". Your suggestion is to move the cipher stuff into an article called 374: 1752:(this is problematic, it's not used because it reveals statistics about your letters, also can lead to permanent informational loss) some consciously made spelling mistakes might help you hide better you message but the orthographic mistakes must be selected by a computer because humans are bad randomizers 244:
I believe that the first three words regarding cryptography have it backwards. Cryptographic protocols are a subset of encryption, not the other way around. Where, before computers, the distinction wasn't instructive, it is now. When I was provided the hyperbolic phrase, cryptographic encryption, it
916:
I trimmed the see also section. I think it should be kept to major topics in encryption, and not become a laundry list of articles that touch on encryption. In particular I removed the recently added Zodiac Killer link, but I did add the the unsolved codes and ciphers category to the Zodiac Killer
829:, claiming they were self promotion. I have nothing to do with any of the sites listed before or after the edits. Some of the changes I made were to conform to Knowledge capitalization style. I removed three links, one to an article that promoted several commercial products for tape backup, one to 432:
As for the diagram, I will note that the placement of rotor machine is probably incorrect. Rotor machines (as the Hebern machine, Enigma machine, SIGABA, Typex, and even the non-rotor Japanese stepping switch machines) are fundamentally substitution cyphers, albeit polyalphabetic ones. The diagram
428:
Tromer, Your observation is a common misunderstanding. Encryption can be done in several ways, only one of which uses a cypher. As for 'cipher' being customarily a subset of private-key encryption, that is true only if by private key one means symmetric key cypher. At least that's the sense I take
1814:
you have to shuffle your lists, you need huge keys, it works (you don't write them by hand but then someone may steal the key, some people use several keys, and different security units handle them, they aren't allowed to communicate with each other, only with the commander. If one security group
1511:
undid improper edit 21:42, 25 May 2010 TedColes (talk | contribs) (6,222 bytes) (Undid revision 364137170 by 67.51.122.18 (talk) Incorrect use). Tedcoles is deleting text that seems quite critical to understanding what this term means. It is widely accepted that password protection is a form of
1421:
Agreed. It is a book cipher. I can see how statistical analysis (a lot of it) might reveal the pattern in a book cipher that is based on a novel (something the Soviets loved to do). However, the numbers running down the columns in a phone book are essentially random. Does anyone know how that
934:
Italian merchants loved the Arabic numbers. They allowed the bankers to get rid of their counting boards. However, while businessmen saw their usefulness, the local governments hated them. In 1299, Florence banned Arabic numerals. The ostensible reason was that the numbers were easily changed and
837:, which suggest users test encryption software by trying to compress the output, a rather inadequate approach, to say the least. I also replaced a link to the pgpi website which is rather out of date with one to the GPG website. If anyone has a problem with these changes please discuss it here. -- 1218:
I think it's fair to ask why they are present in this article. They do look like random citations -- why not any of the other hundreds of journal and conference papers about crypto? Are they being used as a source for any specific point in this article? There's certainly nothing in this article
1787:
It has been used by the US, China and Russia (combined usually with 3 or more other encryptions) but you must have a clear line or preferably a cable (fiber optics). It's bad for space because it's slow, and if you make your lists smaller, then it's faster but anyone can decrypt your message.
1089:
In most current usage, I believe, "encryption" is a broader term than "cipher" and includes techniques such as code books and secret algorithms that do not have a key. Arguably it could extend to analog scramblers and mechanical devices. So I think the split is a good idea, but the encryption
603:
While cryptographic hash functions are certainly not a cipher, they are a vital part of encryption technology. Someone unfamiliar with the plumbing of encryption will just type "encryption" into Knowledge and hope to get an overview of the subject with links to the details. This seems like a
607:
It is logical that the Encryption entry should have brief descriptions of symmetric and asymmetric ciphers, hash functions and encryption-strength pRNGs in order to best serve users who may be unfamiliar with the categories or taxonomy related to the subject.
245:
had a dissonance, because it was in the past redundant, and today, plain wrong. Encryption is the larger matter, various cryptographic schemes are a subset. But to simply re-write that, In encryption, cryptography etc etc does a huge injustice to clarity.
321: 851:
i'm not a mathetician, hell i failed all my math classes, but i consider myself to be a programmer but i've learn some math just by programing.. (weird huh?) is there any non math equations that show encryption techniques, the links like this
1819:. Even the commander isn't supposed to know all the details, only the generic management. (secrets leak outside the system, people don't play all day long with technology... some have sex with unknown people..... encryption won't help then) 623:, which deals (hopefully) with everything, including the entire gamut of PRNGs, digital signatures, hash functions, secret sharing schemes, authentication protocols, MACs and so on. This article, which deals with ciphers, is termed 1118:
Two of the five references were to obscure papers by a Saudi. I removed them. Care should be taken to make sure he doesn't add them back. The references should be to well known authoritative works like _Code Breakers_.
618:
OK, I can see what you're getting at here; you're saying that "encryption" is sometimes used to mean "encryption technology", which is essentially the field of "cryptography". Currently, we have an overview of the field in
1682:
Before the Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user Joey006@lavabit.com for alleged possession of child
954:
Most of this article is about term "cipher", not about term "encryption". I see that this article was created by merger of those two articles, so this situation is understandable. I propose 2 possible solutions:
1850:
Reference 2, "History of Cryptography" is from Binance Academy, with no further sources at the reference source. Not sure where binance gets their info from, but this source is essentially just "dude trust me".
1727:
each piece of information has a list of possible encryptions, Alice and Bob (sender and receiver) know that list, a randomizer picks a random synonymous encryption (that causes encryptions to be large, but are
251:
Maybe there can be a phrase to modify protocol, so we don't encrypt this revised definition. But this needs a discerning eye because physics and computer geeks are misusing this term by the second. ----
272: 734:
are not directly related with security (meaning security against intruders, etc.), but rather they are used to transfer data in a defined form and/or to secure data against transfer errors. For example
792:
I apologise, I don't know how to use the coding that has been used at the top of the article to talk about other uses of the word. I just thought that it may be worth adding a note about the album
774:
I agree that the diagram is confusing, so I've removed it for now. Codes were indeed used in cryptography for secrecy, and not (well, not primarily) for error checking or as a standard like ASCII.
141: 1731:
the size of the encryption output is variable, each information has lists of synonymous encryptions of many sizes of digits, each size-list must contain as many as possible synonymous encryptions
1061:
if they're covering the same thing? I suggest we merge them back; I don't particularly mind if the article is called "cipher" or "encryption", but I think we should really cover it in one place.
1826: 1795: 1555:
No, password protection is not encryption. Breaking the password is like breaking the lock off of a bicycle—one can immediately ride the bicycle. Encryption is nowhere near that easy.
567:
I'm not sure this is the right place to diversify into a discussion of crypto hash functions -- secure hashing isn't usually described as "encryption", although it's certainly part of
1899: 1053:
Hmmm. I agree that this article could do with cleaning up, but I don't think two separate articles on the same topic is the best way to go. After all, how do you decide what goes in
1190:
I haven't read them; I have no idea what's in them. I am simply reacting to their removal without sufficient explanation. Their being obscure isn't good enough reason for removal.
1763:, animals are bad randomizers and they can never type the Bible even after eternal infinities, because are restricted by their "envelope of chaos" function, their attractor. 521:" style is that, e.g., a classical substitution cipher isn't labelled as a symmetric key cipher, which might be desirable, but I think it's more important to reflect usage. 1017:
on clarity if we move the stuff about the cipher to new article called "Cipher". I don't see why we can't have a small article "Encryption" which would say something like "
1924: 165: 1889: 510:. There is a problem with making a taxonomy of ciphers. There are (at least) two ways of approaching it, and each is somewhat unsatisfactory. The first is a more " 1929: 699:
all that gibberish by some German joker, who can't even write decent English. Just in case anyone wants to look at it, it's down there in this page's history. --
1914: 1904: 1384:
I have been told a WWII encryption was based on an old phone book. i.e. essentially use once pad easy to get by both parties. I was also told it was broken.
131: 1646:
I removed the table of contents from this article because I felt it was distracting and served no purpose (there's no subsections!). Please add subsections!
1531:
Do others agree with this anonymous assertion that password protection is a form of encryption? Finding the password would lead to the raw information, i.e.
1854:
While I don't really doubt the truth of this claim, can we get a better source for early encryption and cryptographic history other than a binance article?
1350:
I see an article about printer data encryption; one that doesn't attribute its author. Without an author, we have no sense of expertise or reliability, per
35: 1934: 1919: 1013:
Yes, it's the same topic, but two different terms. It's a bit confusing this way: article which is about cipher is named "encryption". I think we gain a
1499:. As pointed out by others, these topics require sufficient space to explain. Perhaps earlier, when both were shorter it would have made sense. Now, 643:
would then be duplicating each other to a large extent. I'd propose an alternative: to this page, add a "disambiguation" header saying something like:
1939: 1884: 386: 345: 284: 1090:
article needs to written more broadly. It should mention classical ciphers, rotor machines, codes, and give a brief intro to public key crypto. --
746:
Therefore i disagree with the sentence: "Some systems used both codes and ciphers in one system, using superencipherment to increase the security."
1894: 858: 107: 517:
The alternative approach, employed here, is to divide ciphers into sections according to how they are divided in practice. The problem with the "
1909: 160: 74: 719:
Besides of a bit confusing diagram in the "Types of cipher" section, I think that in the "Ciphers versus codes" section distingushing between
1647: 1519: 604:
reasonable approach to making the Encryption and Cipher entries different so they work best for users. Encryption is a more general term.
1406:. If you have a reliable reference that book ciphers were used during WWII, it might be worth adding them to the article on book ciphers. 1628: 1407: 1126: 647:
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology related to encryption, see
1830: 1799: 1615: 1577: 1278: 862: 98: 69: 1205: 1177: 830: 493:
Steam and block: in usage, yes. "Public key" and "private key" are, essentially, synonymous with "assymetric" and "symmetric key".
1755:(there is a myth that monkeys are good randomizers, a pure myth, monkeys neurotically press a range of buttons in a chaotic but 1879: 373:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
271:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
1749:
typical and statistically common phrases are coded as one piece of information, they're not fragmented into separate letters
938:
Of course, you must keep in mind that Zero-into-6 was at the core of the issue, and that the old name for Zero was cipher.
1039:
As there were no stern opposes, I proceeded with split. Now I will revamp the articles to make 2 meaningful entities. --
44: 1627:
Its not been changed and I too think it should be removed. I added the POV tag to warn users away from the statement.
677:
This text was added by an anonymous user. I'm not at all sure what it is supposed to be saying, so I've moved it here:
560: 529:
I think that classical ciphers would fit well enough under symmetric encryption in a symmetric vs. asymmetric layout.
1599:
It should be removed, but I think the note about where things should be encrypted could remain. So I'm changing it.
1460:
I disagree. Encryption is different from Whole Disk encryption. This page explains encryption in general, whereas
572: 507: 1486: 1651: 1095: 1734:
the reader of the message, must have a secondary key, to know the order of the digital fragmentation packages
1523: 1025:", and then a big "Cipher" article which deals with term cipher. Wouldn't that be terminologically correct? -- 1632: 1411: 1332:
Because it has useful information about the topic. Please give your suggestion after reading the article. --
1130: 440:
I'm going to make a text version of the diagram here, so it's easier for me (and presumably others) to edit:
1220: 866: 1209: 1181: 1611: 1581: 1274: 834: 588: 1745:
you have to dedicate many digit-sizes to noise, otherwise Eve the eavesdropper might find some patterns.
1560: 1427: 1392: 1367: 1322: 1240: 1195: 1166: 1146: 50: 1669:
Talk:Lavabit#RfC: Should information about Lavabit complying with previous search warrants be included?
1270: 1707:
I've found articles for the needed citations. I will be removing the additional citations needed tag.
1822: 1791: 1603: 1573: 1515: 1481: 1475: 1266: 1263:
Why would someone remove a site that is related to encryption from external links? www.hisecure.net
1122: 195: 21: 1861: 1765:
Monkeys cannot type the Bible, even after eternal infinities, because they are restricted by their
1693: 1496: 1465: 1450: 1333: 1091: 918: 882: 838: 106:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1712: 1544: 1337: 1302: 793: 394: 353: 312:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
292: 248:
Perhaps, Cryptography is a manner of encryption which employs an express protocol intended to...
1607: 1044: 1030: 986: 826: 666: 611: 584: 1556: 1423: 1388: 1363: 1318: 1236: 1224: 1191: 1162: 1142: 1062: 1002: 775: 688: 658: 576: 522: 494: 1500: 1461: 1442: 1001:
section only. A cipher is an algorithm for encryption — essentially, it's the same topic.
333: 329: 420:
should be specialized to the customary (though vague) subset of private-key encryption.
1857: 1689: 1446: 1294: 1290: 811: 801: 1873: 1708: 1540: 1298: 1141:
Why would an obscure work not be appropriate? I haven't seen that in any guidelines.
899: 704: 390: 349: 337: 325: 288: 1503:
is actually longer and more complete than this article. 11:26 04 October 2010 (UTC)
1766: 1668: 1351: 1176:
Would you mind explaining why you think these references should be in the article.
1040: 1026: 982: 931:
To quote pages 80-81 of Zero, The Biography of a Dangerous Idea, by Charles Seife:
855:
didn't help much, i rather have newbie friendly sourcecode.. to examine and apply.
833:
which has a couple of paragraphis on the subject and a link back to Knowledge, and
648: 636: 620: 568: 530: 103: 1737:âš  many packages of certain digital sizes do not encrypt anything, just pure noise, 853: 1403: 1354:. I see a small amount of text information that, if brought here, could amplify 941: 870: 369: 308: 276: 267: 1784:
That requires huge lists from sender and receiver, also the messages are huge.
1536: 1219:
specifically about Arabic cryptology. We have more specialised articles (e.g.
1058: 998: 978: 970: 640: 635:
survey all the cryptography mechanisms. The problem with this is that most of
632: 624: 409: 378: 199: 1665:
There is a request for comments (RfC) that may be of interest. The RfC is at
1803: 1769: 1532: 753: 1468:
discusses encryption of a specific type. It still falls under the category
727:
based on amount of data processed (words x letters) is a misunderstanding.
150: 1596:
The last paragraph shows a product/implementation specific point of view.
1358:
article. Having useful information is a trait of a good reference, having
1161:
Somebody keeps removing the works by Ibrahim Al-kadi. Please explain why.
944: 736: 1362:
useful information, too much detail, is a trait of a good external link.
895: 797: 700: 825:
I'm restoring edits to the External links section that were reverted by
695:
Fastfission, you did the first half of the job. I did the other half: I
1674: 1673:
At issue is whether we should delete or keep the following text in the
583:
I think this should be moved to the "Message verification" subsection.
434: 90: 63: 1570:
Yes, password protection is widely accepted as a form of encryption.
1773: 1317:
Please explain why a blog link should be included at External links.
1054: 1022: 974: 966: 960: 628: 489:
Do "Stream" and "Block" really only apply to "Private Key" ciphers ?
417: 413: 240:
Illustrate general process of both public and private-key encryption.
831:
Encryption, from MysecureCyberspace's encyclopedia on cybersecurity
740: 1865: 1834: 1760: 1716: 1697: 1655: 1636: 1619: 1585: 1564: 1548: 1489: 1454: 1431: 1415: 1396: 1371: 1341: 1326: 1306: 1282: 1244: 1230: 1213: 1199: 1185: 1170: 1150: 1134: 1099: 1068: 1048: 1034: 1008: 990: 921: 903: 885: 841: 814: 804: 781: 708: 592: 533: 398: 357: 296: 749:
Of course I mean the "technical discussions" usage of the words.
1815:
delivers the key to the enemy, the other keys are safe, so our
879: 1464:
explains methods of whole disks being encrypted. For example,
556: 552: 181: 15: 149: 1688:
Your input on this question would be very much welcome. --
977:
and leaving only the intro section here. That would make
223: 217: 211: 205: 894:
Haven't you ever considered learning some English? --
835:
SecurityBulletins.com Basic Encryption testing methods
416:
are currently too similar. They should be merged, or
364:
Wiki Education Foundation-supported course assignment
303:
Wiki Education Foundation-supported course assignment
262:
Wiki Education Foundation-supported course assignment
102:, a collaborative effort to improve the coverage of 1539:, so in my book the information is not encrypted.-- 973:by moving everything except the introduction to 544:I moved this recent addition here temporarily: 1900:Knowledge level-4 vital articles in Technology 8: 682:practical example of not too deciphered news 1820: 1789: 1474:In Knowledge, Encryption may refer to the 58: 1472:, but not whole disk. However, I think a 387:Template:Dashboard.wikiedu.org assignment 346:Template:Dashboard.wikiedu.org assignment 285:Template:Dashboard.wikiedu.org assignment 1925:Top-importance Computer science articles 1661:RfC concerning the Lavabit email service 981:a stub, but would solve our problem. -- 385:Above undated message substituted from 344:Above undated message substituted from 283:Above undated message substituted from 60: 19: 1890:Knowledge vital articles in Technology 1827:2A02:2149:847A:1E00:9444:E682:3FB:B7E3 1796:2A02:2149:8227:A300:9444:E682:3FB:B7E3 764:is the same. But I still disagree :). 468:(shouldn't this be "assymetric key" ?) 405:articles should be merged, too similar 1930:WikiProject Computer science articles 474:(shouldn't this be "symmetric key" ?) 7: 1915:Top-importance Cryptography articles 1905:C-Class vital articles in Technology 96:This article is within the scope of 49:It is of interest to the following 1204:Ok, thanks for the clarification. 317: 313: 116:Knowledge:WikiProject Cryptography 14: 1935:WikiProject Cryptography articles 1920:C-Class Computer science articles 657:Do you think that would suffice? 424:disagree, and problems w/ diagram 119:Template:WikiProject Cryptography 1940:Knowledge pages with to-do lists 1885:Knowledge level-4 vital articles 997:I would suggest we move out the 368: 320:. Further details are available 307: 266: 189: 89: 62: 29: 20: 743:or ASCII code and many others. 136:This article has been rated as 1895:C-Class level-4 vital articles 904:16:10, 26 September 2008 (UTC) 805:16:29, 11 September 2006 (UTC) 709:16:08, 26 September 2008 (UTC) 508:Image talk:Cipher-taxonomy.png 1: 1910:C-Class Cryptography articles 1866:06:59, 8 September 2022 (UTC) 1586:15:45, 10 November 2011 (UTC) 1455:17:06, 15 February 2010 (UTC) 1100:21:28, 29 November 2007 (UTC) 1069:20:38, 29 November 2007 (UTC) 1049:11:45, 29 November 2007 (UTC) 1035:08:41, 28 November 2007 (UTC) 1009:22:13, 27 November 2007 (UTC) 991:21:31, 27 November 2007 (UTC) 752:Finally, I found out that in 593:03:02, 13 November 2013 (UTC) 158:This article is supported by 110:and see a list of open tasks. 927:History of the word 'cipher' 842:22:30, 18 October 2006 (UTC) 815:09:46, 22 October 2006 (UTC) 782:21:05, 14 January 2006 (UTC) 599:Cryptographic hash functions 534:07:46, 19 January 2006 (UTC) 399:20:34, 16 January 2022 (UTC) 358:20:42, 17 January 2022 (UTC) 297:20:42, 17 January 2022 (UTC) 161:WikiProject Computer science 1698:05:07, 29 August 2013 (UTC) 1637:17:45, 11 August 2011 (UTC) 1445:page should be merged here 945:14:57, 31 August 2007 (UTC) 871:02:31, 4 January 2007 (UTC) 846: 730:As I always understood it, 665:This does seem reasonable. 563:entry for more information. 561:Cryptographic hash function 540:Encryption: hash functions? 1956: 1422:particular one was solved? 1372:16:26, 22 April 2009 (UTC) 1342:15:23, 22 April 2009 (UTC) 1327:15:07, 22 April 2009 (UTC) 1293:and/or isn't particularly 1245:15:12, 28 April 2008 (UTC) 1231:17:12, 26 April 2008 (UTC) 1214:17:11, 26 April 2008 (UTC) 1200:16:29, 26 April 2008 (UTC) 1186:15:17, 26 April 2008 (UTC) 1171:13:30, 26 April 2008 (UTC) 1157:Ibrahim Al-kadi references 1151:13:32, 26 April 2008 (UTC) 1135:13:23, 26 April 2008 (UTC) 573:symmetric key cryptography 1835:20:08, 4 March 2018 (UTC) 1804:18:27, 4 March 2018 (UTC) 1656:03:16, 7 March 2012 (UTC) 1307:07:41, 11 July 2008 (UTC) 1283:04:36, 11 July 2008 (UTC) 691:02:18, 27 Jan 2005 (UTC) 525:09:18, 22 Aug 2004 (UTC) 437:15:12, 19 Jul 2004 (UTC) 157: 135: 84: 57: 1717:14:22, 21 May 2015 (UTC) 1620:11:20, 30 May 2011 (UTC) 1565:15:45, 1 June 2010 (UTC) 1549:09:17, 1 June 2010 (UTC) 1490:02:42, 29 May 2010 (UTC) 1480:tag should be put up. -- 1432:05:31, 6 June 2009 (UTC) 1416:07:27, 1 June 2009 (UTC) 1397:19:57, 31 May 2009 (UTC) 1380:Not quite on the subject 922:02:19, 5 June 2007 (UTC) 886:02:19, 5 June 2007 (UTC) 767:What are your opinions? 669:23:54, 7 Oct 2004 (UTC) 614:21:27, 3 Oct 2004 (UTC) 579:13:14, 2 Oct 2004 (UTC) 497:09:18, 22 Aug 2004 (UTC) 99:WikiProject Cryptography 1721: 1437:Merge disk encryption ? 1221:History of cryptography 673:Text added by anon user 661:22:14, 3 Oct 2004 (UTC) 237:Revamp taxonomy diagram 1880:C-Class vital articles 1289:Because it looks like 1021:is the act of using a 965:split this article to 737:error correcting codes 565: 154: 1772:which by no means is 959:move this article to 950:Spliting this article 926: 861:comment was added by 546: 433:should reflect this. 377:. Student editor(s): 324:. Student editor(s): 275:. Student editor(s): 153: 122:Cryptography articles 36:level-4 vital article 1592:product-specific POV 1476:Full disk encryption 754:cryptography article 715:Ciphers versus codes 549:Cryptographic hashes 1507:Password protection 1466:Pretty Good Privacy 999:Etymology of cipher 847:where's sourcecode? 1817:encryption entropy 1722:You didn't mention 1313:Blog external link 788:Encryption (album) 756:the definition of 375:on the course page 322:on the course page 273:on the course page 229:Updated 2014-03-22 155: 45:content assessment 1837: 1825:comment added by 1806: 1794:comment added by 1759:random way, read 1623: 1606:comment added by 1576:comment added by 1518:comment added by 1285: 1269:comment added by 1228: 1137: 1125:comment added by 1066: 1057:and what goes in 1006: 874: 827:User:Austinmurphy 779: 502:Taxonomy approach 259: 258: 180: 179: 176: 175: 172: 171: 1947: 1846:Shaky References 1703:Added references 1622: 1600: 1588: 1527: 1495:I also disagree 1484: 1387:Anyone know how? 1264: 1226: 1120: 1064: 1004: 856: 777: 741:the Hamming code 519:usage-reflecting 401: 372: 360: 319: 315: 311: 299: 270: 230: 193: 192: 182: 142:importance scale 124: 123: 120: 117: 114: 93: 86: 85: 80: 77: 75:Computer science 66: 59: 42: 33: 32: 25: 24: 16: 1955: 1954: 1950: 1949: 1948: 1946: 1945: 1944: 1870: 1869: 1848: 1724: 1705: 1663: 1644: 1601: 1594: 1571: 1513: 1509: 1501:Disk encryption 1482: 1462:Disk encryption 1443:Disk encryption 1439: 1382: 1315: 1261: 1159: 1116: 952: 929: 914: 857:—The preceding 849: 823: 790: 717: 675: 601: 542: 504: 426: 407: 384: 366: 343: 314:13 January 2020 305: 282: 264: 255: 254: 204: 190: 121: 118: 115: 112: 111: 78: 72: 43:on Knowledge's 40: 30: 12: 11: 5: 1953: 1951: 1943: 1942: 1937: 1932: 1927: 1922: 1917: 1912: 1907: 1902: 1897: 1892: 1887: 1882: 1872: 1871: 1847: 1844: 1843: 1842: 1841: 1840: 1839: 1838: 1783: 1781: 1780: 1779: 1778: 1750: 1743: 1742: 1741: 1740: 1739: 1738: 1729: 1723: 1720: 1704: 1701: 1686: 1685: 1662: 1659: 1648:68.173.113.106 1643: 1640: 1626: 1593: 1590: 1568: 1567: 1552: 1551: 1520:209.162.45.112 1508: 1505: 1493: 1492: 1438: 1435: 1419: 1418: 1381: 1378: 1377: 1376: 1375: 1374: 1345: 1344: 1314: 1311: 1310: 1309: 1260: 1257: 1256: 1255: 1254: 1253: 1252: 1251: 1250: 1249: 1248: 1247: 1158: 1155: 1154: 1153: 1115: 1112: 1111: 1110: 1109: 1108: 1107: 1106: 1105: 1104: 1103: 1102: 1078: 1077: 1076: 1075: 1074: 1073: 1072: 1071: 994: 993: 963: 951: 948: 928: 925: 913: 910: 909: 908: 907: 906: 889: 888: 848: 845: 822: 821:External links 819: 818: 817: 789: 786: 785: 784: 716: 713: 712: 711: 685: 684: 674: 671: 663: 662: 655: 654: 653: 600: 597: 596: 595: 541: 538: 537: 536: 503: 500: 499: 498: 487: 486: 485: 484: 483: 482: 479: 470: 461: 460: 459: 456: 455: 454: 453:Rotor machines 445: 425: 422: 406: 403: 365: 362: 304: 301: 263: 260: 257: 256: 242: 241: 238: 232: 187: 185: 178: 177: 174: 173: 170: 169: 166:Top-importance 156: 146: 145: 138:Top-importance 134: 128: 127: 125: 108:the discussion 94: 82: 81: 79:Top‑importance 67: 55: 54: 48: 26: 13: 10: 9: 6: 4: 3: 2: 1952: 1941: 1938: 1936: 1933: 1931: 1928: 1926: 1923: 1921: 1918: 1916: 1913: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1891: 1888: 1886: 1883: 1881: 1878: 1877: 1875: 1868: 1867: 1863: 1859: 1855: 1852: 1845: 1836: 1832: 1828: 1824: 1818: 1813: 1812: 1811: 1810: 1809: 1808: 1807: 1805: 1801: 1797: 1793: 1785: 1777: 1775: 1771: 1768: 1762: 1758: 1754: 1753: 1751: 1748: 1747: 1746: 1736: 1735: 1733: 1732: 1730: 1726: 1725: 1719: 1718: 1714: 1710: 1702: 1700: 1699: 1695: 1691: 1684: 1680: 1679: 1678: 1676: 1671: 1670: 1666: 1660: 1658: 1657: 1653: 1649: 1641: 1639: 1638: 1634: 1630: 1629:97.83.152.148 1624: 1621: 1617: 1613: 1609: 1605: 1597: 1591: 1589: 1587: 1583: 1579: 1575: 1566: 1562: 1558: 1554: 1553: 1550: 1546: 1542: 1538: 1534: 1530: 1529: 1528: 1525: 1521: 1517: 1512:encryption. 1506: 1504: 1502: 1498: 1491: 1488: 1485: 1479: 1477: 1471: 1467: 1463: 1459: 1458: 1457: 1456: 1452: 1448: 1444: 1436: 1434: 1433: 1429: 1425: 1417: 1413: 1409: 1408:92.106.113.28 1405: 1401: 1400: 1399: 1398: 1394: 1390: 1385: 1379: 1373: 1369: 1365: 1361: 1357: 1353: 1349: 1348: 1347: 1346: 1343: 1339: 1335: 1331: 1330: 1329: 1328: 1324: 1320: 1312: 1308: 1304: 1300: 1296: 1292: 1288: 1287: 1286: 1284: 1280: 1276: 1272: 1268: 1258: 1246: 1242: 1238: 1235:Good points. 1234: 1233: 1232: 1229: 1222: 1217: 1216: 1215: 1211: 1207: 1203: 1202: 1201: 1197: 1193: 1189: 1188: 1187: 1183: 1179: 1175: 1174: 1173: 1172: 1168: 1164: 1156: 1152: 1148: 1144: 1140: 1139: 1138: 1136: 1132: 1128: 1127:67.163.141.50 1124: 1113: 1101: 1097: 1093: 1088: 1087: 1086: 1085: 1084: 1083: 1082: 1081: 1080: 1079: 1070: 1067: 1060: 1056: 1052: 1051: 1050: 1046: 1042: 1038: 1037: 1036: 1032: 1028: 1024: 1020: 1016: 1012: 1011: 1010: 1007: 1000: 996: 995: 992: 988: 984: 980: 976: 972: 968: 964: 962: 958: 957: 956: 949: 947: 946: 943: 939: 936: 932: 924: 923: 920: 912:Trim see also 911: 905: 901: 897: 893: 892: 891: 890: 887: 884: 880: 877: 876: 875: 872: 868: 864: 860: 854: 844: 843: 840: 836: 832: 828: 820: 816: 813: 809: 808: 807: 806: 803: 799: 795: 787: 783: 780: 773: 772: 771: 768: 765: 763: 759: 755: 750: 747: 744: 742: 738: 733: 728: 726: 722: 714: 710: 706: 702: 698: 694: 693: 692: 690: 683: 680: 679: 678: 672: 670: 668: 660: 656: 652: 650: 645: 644: 642: 638: 634: 630: 626: 622: 617: 616: 615: 613: 609: 605: 598: 594: 590: 586: 582: 581: 580: 578: 574: 570: 564: 562: 558: 554: 550: 545: 539: 535: 532: 528: 527: 526: 524: 520: 515: 513: 509: 501: 496: 492: 491: 490: 480: 477: 476: 475: 471: 469: 465: 464: 462: 458:Transposition 457: 452: 451: 450:Substitution 449: 448: 446: 443: 442: 441: 438: 436: 430: 423: 421: 419: 415: 411: 404: 402: 400: 396: 392: 388: 382: 380: 376: 371: 363: 361: 359: 355: 351: 347: 341: 339: 335: 331: 327: 323: 310: 302: 300: 298: 294: 290: 286: 280: 278: 274: 269: 261: 253: 249: 246: 239: 236: 235: 234: 231: 228: 225: 222: 219: 216: 213: 210: 207: 203: 201: 197: 186: 184: 183: 167: 164:(assessed as 163: 162: 152: 148: 147: 143: 139: 133: 130: 129: 126: 109: 105: 101: 100: 95: 92: 88: 87: 83: 76: 71: 68: 65: 61: 56: 52: 46: 38: 37: 27: 23: 18: 17: 1856: 1853: 1849: 1821:— Preceding 1816: 1790:— Preceding 1786: 1782: 1764: 1756: 1744: 1706: 1687: 1683:pornography. 1681: 1672: 1667: 1664: 1645: 1625: 1608:IsmaelLuceno 1602:— Preceding 1598: 1595: 1578:67.51.122.18 1572:— Preceding 1569: 1510: 1494: 1473: 1469: 1441:I think the 1440: 1420: 1386: 1383: 1359: 1355: 1316: 1271:Metamorph123 1262: 1259:hisecure.net 1160: 1117: 1018: 1014: 953: 940: 937: 933: 930: 915: 863:75.15.191.81 850: 824: 791: 769: 766: 761: 757: 751: 748: 745: 731: 729: 724: 720: 718: 696: 686: 681: 676: 667:Vancegloster 664: 649:cryptography 646: 637:Cryptography 621:Cryptography 612:Vancegloster 610: 606: 602: 585:Greatpopcorn 569:cryptography 566: 548: 547: 543: 518: 516: 511: 505: 488: 473: 472:Private Key 467: 439: 431: 427: 408: 383: 367: 342: 306: 281: 265: 250: 247: 243: 233: 226: 220: 214: 208: 194: 188: 159: 137: 113:Cryptography 104:Cryptography 97: 70:Cryptography 51:WikiProjects 34: 1728:manageable) 1557:Binksternet 1514:—Preceding 1424:Aaaronsmith 1404:book cipher 1389:Aaaronsmith 1364:Binksternet 1319:Binksternet 1265:—Preceding 1237:Binksternet 1206:85.2.112.20 1192:Binksternet 1178:85.2.112.20 1163:Binksternet 1143:Binksternet 1121:—Preceding 917:article. -- 689:Fastfission 631:, and have 559:. See the 466:Public Key 1874:Categories 1537:ciphertext 1483:Mithrandir 1470:encryption 1402:This is a 1114:References 1059:encryption 1019:encryption 979:Encryption 971:Encryption 794:Encryption 641:Encryption 633:Encryption 625:Encryption 447:Classical 410:Encryption 334:Jackbelshe 330:Markscarsi 318:1 May 2020 200:Encryption 196:To-do list 1858:Zeph.tech 1770:attractor 1690:Guy Macon 1677:article: 1533:plaintext 1447:Bikepunk2 812:J Milburn 802:J Milburn 506:See also 39:is rated 1823:unsigned 1792:unsigned 1709:BadSprad 1616:contribs 1604:unsigned 1574:unsigned 1541:TedColes 1516:unsigned 1497:Rfellows 1360:too much 1334:Player82 1299:Nuwewsco 1279:contribs 1267:unsigned 1123:unsigned 942:ryanakca 859:unsigned 810:Anyone? 798:Pro-jekt 512:abstract 391:PrimeBOT 350:PrimeBOT 338:Zoharrab 326:DGC12345 289:PrimeBOT 1767:chaotic 1675:Lavabit 1487:(Talk!) 1295:notable 1225:— Matt 1063:— Matt 1041:Dijxtra 1027:Dijxtra 1003:— Matt 983:Dijxtra 776:— Matt 725:ciphers 697:deleted 531:Jobarts 463:Modern 444:Ciphers 224:refresh 212:history 140:on the 41:C-class 1774:random 1227:Crypto 1065:Crypto 1055:cipher 1023:cipher 1005:Crypto 975:Cipher 967:Cipher 961:Cipher 778:Crypto 762:cipher 659:— Matt 629:Cipher 577:— Matt 523:— Matt 495:— Matt 478:Stream 418:Cipher 414:Cipher 277:Bhale2 47:scale. 1761:chaos 1642:Short 1352:WP:RS 739:like 732:codes 721:codes 481:Block 379:Eph17 218:watch 28:This 1862:talk 1831:talk 1800:talk 1713:talk 1694:talk 1652:talk 1633:talk 1612:talk 1582:talk 1561:talk 1545:talk 1535:not 1524:talk 1451:talk 1428:talk 1412:talk 1393:talk 1368:talk 1356:this 1338:talk 1323:talk 1303:talk 1291:spam 1275:talk 1241:talk 1210:talk 1196:talk 1182:talk 1167:talk 1147:talk 1131:talk 1096:talk 1045:talk 1031:talk 987:talk 969:and 900:talk 878:Try 867:talk 770:PeP 758:code 723:and 705:talk 639:and 589:talk 571:and 555:and 412:and 395:talk 354:talk 316:and 293:talk 206:edit 198:for 1757:not 1223:). 1092:agr 1015:lot 919:agr 896:AVM 883:agr 839:agr 796:by 701:AVM 557:SHA 553:MD5 389:by 348:by 287:by 132:Top 1876:: 1864:) 1833:) 1802:) 1715:) 1696:) 1654:) 1635:) 1618:) 1614:• 1584:) 1563:) 1547:) 1526:) 1453:) 1430:) 1414:) 1395:) 1370:) 1340:) 1325:) 1305:) 1297:? 1281:) 1277:• 1243:) 1212:) 1198:) 1184:) 1169:) 1149:) 1133:) 1098:) 1047:) 1033:) 989:) 902:) 881:-- 869:) 800:. 760:x 707:) 687:-- 591:) 575:. 435:ww 397:) 381:. 356:) 340:. 336:, 332:, 328:, 295:) 279:. 168:). 73:: 1860:( 1829:( 1798:( 1776:. 1711:( 1692:( 1650:( 1631:( 1610:( 1580:( 1559:( 1543:( 1522:( 1478:. 1449:( 1426:( 1410:( 1391:( 1366:( 1336:( 1321:( 1301:( 1273:( 1239:( 1208:( 1194:( 1180:( 1165:( 1145:( 1129:( 1094:( 1043:( 1029:( 985:( 898:( 873:. 865:( 735:[ 703:( 651:. 587:( 393:( 352:( 291:( 227:· 221:· 215:· 209:· 202:: 144:. 53::

Index


level-4 vital article
content assessment
WikiProjects
WikiProject icon
Cryptography
Computer science
WikiProject icon
WikiProject Cryptography
Cryptography
the discussion
Top
importance scale
Taskforce icon
WikiProject Computer science
Top-importance
To-do list
Encryption
edit
history
watch
refresh

on the course page
Bhale2
Template:Dashboard.wikiedu.org assignment
PrimeBOT
talk
20:42, 17 January 2022 (UTC)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑