31:
429:
from your comment. The spelling is (cy v ci) is irrelevant as to meaning, but excites comment (see Talk:Cryptography for some history on WP). As the diagram notes, cyphers come in symmetric and asymmetric flavors, and symmetric cyphers are sometimes (confusingly) called private key cyphers. Asymmetric key cyphers are sometimes (wrongly) taken to be all public key/private key cyphers. Not all are, as there exist some in which there are no public keys.
551:, also known as one-way hashes or message digests, are used to encrypt data so that it cannot ever be decrypted, but it can be recognized because the same data always produces the same output. Other unique features of this form of encryption include that no matter the size of the input, the size of the output is always the same (the size of the output varies from algorithm to algorithm), and that no keys are used. Popular algorithms include
514:" classification, dividing the ciphers strictly according to how they function. The problem with this approach is that you then make distinctions that are never made in practice: the distinction between substitution and transposition is only really used in the context of classical ciphers; the distinction between symmetric and asymmetric ciphers is only really used in the context of modern cryptography, and so on.
191:
370:
309:
268:
151:
91:
64:
22:
935:
falsified. (A 0 could be turned into a 6 with a simple flourish of a pen, for instance.) But the advantages of zero and other Arabic numerals were not so easily dispensed with; Italian merchants continued to use them, and even used them to send encrypted messages - which is how the word 'cipher' came to mean "secret code."
627:— in my experience, most cryptographers use "encryption" to refer to the action of ciphers, so it's a good title. You've pointed out, though, that sometimes people are looking for an overview of the entire field when they search for "encryption". Your suggestion is to move the cipher stuff into an article called
374:
1752:(this is problematic, it's not used because it reveals statistics about your letters, also can lead to permanent informational loss) some consciously made spelling mistakes might help you hide better you message but the orthographic mistakes must be selected by a computer because humans are bad randomizers
244:
I believe that the first three words regarding cryptography have it backwards. Cryptographic protocols are a subset of encryption, not the other way around. Where, before computers, the distinction wasn't instructive, it is now. When I was provided the hyperbolic phrase, cryptographic encryption, it
916:
I trimmed the see also section. I think it should be kept to major topics in encryption, and not become a laundry list of articles that touch on encryption. In particular I removed the recently added Zodiac Killer link, but I did add the the unsolved codes and ciphers category to the Zodiac Killer
829:, claiming they were self promotion. I have nothing to do with any of the sites listed before or after the edits. Some of the changes I made were to conform to Knowledge capitalization style. I removed three links, one to an article that promoted several commercial products for tape backup, one to
432:
As for the diagram, I will note that the placement of rotor machine is probably incorrect. Rotor machines (as the Hebern machine, Enigma machine, SIGABA, Typex, and even the non-rotor
Japanese stepping switch machines) are fundamentally substitution cyphers, albeit polyalphabetic ones. The diagram
428:
Tromer, Your observation is a common misunderstanding. Encryption can be done in several ways, only one of which uses a cypher. As for 'cipher' being customarily a subset of private-key encryption, that is true only if by private key one means symmetric key cypher. At least that's the sense I take
1814:
you have to shuffle your lists, you need huge keys, it works (you don't write them by hand but then someone may steal the key, some people use several keys, and different security units handle them, they aren't allowed to communicate with each other, only with the commander. If one security group
1511:
undid improper edit 21:42, 25 May 2010 TedColes (talk | contribs) (6,222 bytes) (Undid revision 364137170 by 67.51.122.18 (talk) Incorrect use). Tedcoles is deleting text that seems quite critical to understanding what this term means. It is widely accepted that password protection is a form of
1421:
Agreed. It is a book cipher. I can see how statistical analysis (a lot of it) might reveal the pattern in a book cipher that is based on a novel (something the
Soviets loved to do). However, the numbers running down the columns in a phone book are essentially random. Does anyone know how that
934:
Italian merchants loved the Arabic numbers. They allowed the bankers to get rid of their counting boards. However, while businessmen saw their usefulness, the local governments hated them. In 1299, Florence banned Arabic numerals. The ostensible reason was that the numbers were easily changed and
837:, which suggest users test encryption software by trying to compress the output, a rather inadequate approach, to say the least. I also replaced a link to the pgpi website which is rather out of date with one to the GPG website. If anyone has a problem with these changes please discuss it here. --
1218:
I think it's fair to ask why they are present in this article. They do look like random citations -- why not any of the other hundreds of journal and conference papers about crypto? Are they being used as a source for any specific point in this article? There's certainly nothing in this article
1787:
It has been used by the US, China and Russia (combined usually with 3 or more other encryptions) but you must have a clear line or preferably a cable (fiber optics). It's bad for space because it's slow, and if you make your lists smaller, then it's faster but anyone can decrypt your message.
1089:
In most current usage, I believe, "encryption" is a broader term than "cipher" and includes techniques such as code books and secret algorithms that do not have a key. Arguably it could extend to analog scramblers and mechanical devices. So I think the split is a good idea, but the encryption
603:
While cryptographic hash functions are certainly not a cipher, they are a vital part of encryption technology. Someone unfamiliar with the plumbing of encryption will just type "encryption" into
Knowledge and hope to get an overview of the subject with links to the details. This seems like a
607:
It is logical that the
Encryption entry should have brief descriptions of symmetric and asymmetric ciphers, hash functions and encryption-strength pRNGs in order to best serve users who may be unfamiliar with the categories or taxonomy related to the subject.
245:
had a dissonance, because it was in the past redundant, and today, plain wrong. Encryption is the larger matter, various cryptographic schemes are a subset. But to simply re-write that, In encryption, cryptography etc etc does a huge injustice to clarity.
321:
851:
i'm not a mathetician, hell i failed all my math classes, but i consider myself to be a programmer but i've learn some math just by programing.. (weird huh?) is there any non math equations that show encryption techniques, the links like this
1819:. Even the commander isn't supposed to know all the details, only the generic management. (secrets leak outside the system, people don't play all day long with technology... some have sex with unknown people..... encryption won't help then)
623:, which deals (hopefully) with everything, including the entire gamut of PRNGs, digital signatures, hash functions, secret sharing schemes, authentication protocols, MACs and so on. This article, which deals with ciphers, is termed
1118:
Two of the five references were to obscure papers by a Saudi. I removed them. Care should be taken to make sure he doesn't add them back. The references should be to well known authoritative works like _Code
Breakers_.
618:
OK, I can see what you're getting at here; you're saying that "encryption" is sometimes used to mean "encryption technology", which is essentially the field of "cryptography". Currently, we have an overview of the field in
1682:
Before the
Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user Joey006@lavabit.com for alleged possession of child
954:
Most of this article is about term "cipher", not about term "encryption". I see that this article was created by merger of those two articles, so this situation is understandable. I propose 2 possible solutions:
1850:
Reference 2, "History of
Cryptography" is from Binance Academy, with no further sources at the reference source. Not sure where binance gets their info from, but this source is essentially just "dude trust me".
1727:
each piece of information has a list of possible encryptions, Alice and Bob (sender and receiver) know that list, a randomizer picks a random synonymous encryption (that causes encryptions to be large, but are
251:
Maybe there can be a phrase to modify protocol, so we don't encrypt this revised definition. But this needs a discerning eye because physics and computer geeks are misusing this term by the second. ----
272:
734:
are not directly related with security (meaning security against intruders, etc.), but rather they are used to transfer data in a defined form and/or to secure data against transfer errors. For example
792:
I apologise, I don't know how to use the coding that has been used at the top of the article to talk about other uses of the word. I just thought that it may be worth adding a note about the album
774:
I agree that the diagram is confusing, so I've removed it for now. Codes were indeed used in cryptography for secrecy, and not (well, not primarily) for error checking or as a standard like ASCII.
141:
1731:
the size of the encryption output is variable, each information has lists of synonymous encryptions of many sizes of digits, each size-list must contain as many as possible synonymous encryptions
1061:
if they're covering the same thing? I suggest we merge them back; I don't particularly mind if the article is called "cipher" or "encryption", but I think we should really cover it in one place.
1826:
1795:
1555:
No, password protection is not encryption. Breaking the password is like breaking the lock off of a bicycle—one can immediately ride the bicycle. Encryption is nowhere near that easy.
567:
I'm not sure this is the right place to diversify into a discussion of crypto hash functions -- secure hashing isn't usually described as "encryption", although it's certainly part of
1899:
1053:
Hmmm. I agree that this article could do with cleaning up, but I don't think two separate articles on the same topic is the best way to go. After all, how do you decide what goes in
1190:
I haven't read them; I have no idea what's in them. I am simply reacting to their removal without sufficient explanation. Their being obscure isn't good enough reason for removal.
1763:, animals are bad randomizers and they can never type the Bible even after eternal infinities, because are restricted by their "envelope of chaos" function, their attractor.
521:" style is that, e.g., a classical substitution cipher isn't labelled as a symmetric key cipher, which might be desirable, but I think it's more important to reflect usage.
1017:
on clarity if we move the stuff about the cipher to new article called "Cipher". I don't see why we can't have a small article "Encryption" which would say something like "
1924:
165:
1889:
510:. There is a problem with making a taxonomy of ciphers. There are (at least) two ways of approaching it, and each is somewhat unsatisfactory. The first is a more "
1929:
699:
all that gibberish by some German joker, who can't even write decent
English. Just in case anyone wants to look at it, it's down there in this page's history. --
1914:
1904:
1384:
I have been told a WWII encryption was based on an old phone book. i.e. essentially use once pad easy to get by both parties. I was also told it was broken.
131:
1646:
I removed the table of contents from this article because I felt it was distracting and served no purpose (there's no subsections!). Please add subsections!
1531:
Do others agree with this anonymous assertion that password protection is a form of encryption? Finding the password would lead to the raw information, i.e.
1854:
While I don't really doubt the truth of this claim, can we get a better source for early encryption and cryptographic history other than a binance article?
1350:
I see an article about printer data encryption; one that doesn't attribute its author. Without an author, we have no sense of expertise or reliability, per
35:
1934:
1919:
1013:
Yes, it's the same topic, but two different terms. It's a bit confusing this way: article which is about cipher is named "encryption". I think we gain a
1499:. As pointed out by others, these topics require sufficient space to explain. Perhaps earlier, when both were shorter it would have made sense. Now,
643:
would then be duplicating each other to a large extent. I'd propose an alternative: to this page, add a "disambiguation" header saying something like:
1939:
1884:
386:
345:
284:
1090:
article needs to written more broadly. It should mention classical ciphers, rotor machines, codes, and give a brief intro to public key crypto. --
746:
Therefore i disagree with the sentence: "Some systems used both codes and ciphers in one system, using superencipherment to increase the security."
1894:
858:
107:
517:
The alternative approach, employed here, is to divide ciphers into sections according to how they are divided in practice. The problem with the "
1909:
160:
74:
719:
Besides of a bit confusing diagram in the "Types of cipher" section, I think that in the "Ciphers versus codes" section distingushing between
1647:
1519:
604:
reasonable approach to making the
Encryption and Cipher entries different so they work best for users. Encryption is a more general term.
1406:. If you have a reliable reference that book ciphers were used during WWII, it might be worth adding them to the article on book ciphers.
1628:
1407:
1126:
647:
This article is about algorithms for encryption and decryption. For an overview of cryptographic technology related to encryption, see
1830:
1799:
1615:
1577:
1278:
862:
98:
69:
1205:
1177:
830:
493:
Steam and block: in usage, yes. "Public key" and "private key" are, essentially, synonymous with "assymetric" and "symmetric key".
1755:(there is a myth that monkeys are good randomizers, a pure myth, monkeys neurotically press a range of buttons in a chaotic but
1879:
373:
This article is or was the subject of a Wiki
Education Foundation-supported course assignment. Further details are available
271:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
1749:
typical and statistically common phrases are coded as one piece of information, they're not fragmented into separate letters
938:
Of course, you must keep in mind that Zero-into-6 was at the core of the issue, and that the old name for Zero was cipher.
1039:
As there were no stern opposes, I proceeded with split. Now I will revamp the articles to make 2 meaningful entities. --
44:
1627:
Its not been changed and I too think it should be removed. I added the POV tag to warn users away from the statement.
677:
This text was added by an anonymous user. I'm not at all sure what it is supposed to be saying, so I've moved it here:
560:
529:
I think that classical ciphers would fit well enough under symmetric encryption in a symmetric vs. asymmetric layout.
1599:
It should be removed, but I think the note about where things should be encrypted could remain. So I'm changing it.
1460:
I disagree. Encryption is different from Whole Disk encryption. This page explains encryption in general, whereas
572:
507:
1486:
1651:
1095:
1734:
the reader of the message, must have a secondary key, to know the order of the digital fragmentation packages
1523:
1025:", and then a big "Cipher" article which deals with term cipher. Wouldn't that be terminologically correct? --
1632:
1411:
1332:
Because it has useful information about the topic. Please give your suggestion after reading the article. --
1130:
440:
I'm going to make a text version of the diagram here, so it's easier for me (and presumably others) to edit:
1220:
866:
1209:
1181:
1611:
1581:
1274:
834:
588:
1745:
you have to dedicate many digit-sizes to noise, otherwise Eve the eavesdropper might find some patterns.
1560:
1427:
1392:
1367:
1322:
1240:
1195:
1166:
1146:
50:
1669:
Talk:Lavabit#RfC: Should information about Lavabit complying with previous search warrants be included?
1270:
1707:
I've found articles for the needed citations. I will be removing the additional citations needed tag.
1822:
1791:
1603:
1573:
1515:
1481:
1475:
1266:
1263:
Why would someone remove a site that is related to encryption from external links? www.hisecure.net
1122:
195:
21:
1861:
1765:
Monkeys cannot type the Bible, even after eternal infinities, because they are restricted by their
1693:
1496:
1465:
1450:
1333:
1091:
918:
882:
838:
106:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1712:
1544:
1337:
1302:
793:
394:
353:
312:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
292:
248:
Perhaps, Cryptography is a manner of encryption which employs an express protocol intended to...
1607:
1044:
1030:
986:
826:
666:
611:
584:
1556:
1423:
1388:
1363:
1318:
1236:
1224:
1191:
1162:
1142:
1062:
1002:
775:
688:
658:
576:
522:
494:
1500:
1461:
1442:
1001:
section only. A cipher is an algorithm for encryption — essentially, it's the same topic.
333:
329:
420:
should be specialized to the customary (though vague) subset of private-key encryption.
1857:
1689:
1446:
1294:
1290:
811:
801:
1873:
1708:
1540:
1298:
1141:
Why would an obscure work not be appropriate? I haven't seen that in any guidelines.
899:
704:
390:
349:
337:
325:
288:
1503:
is actually longer and more complete than this article. 11:26 04 October 2010 (UTC)
1766:
1668:
1351:
1176:
Would you mind explaining why you think these references should be in the article.
1040:
1026:
982:
931:
To quote pages 80-81 of Zero, The Biography of a Dangerous Idea, by Charles Seife:
855:
didn't help much, i rather have newbie friendly sourcecode.. to examine and apply.
833:
which has a couple of paragraphis on the subject and a link back to Knowledge, and
648:
636:
620:
568:
530:
103:
1737:âš many packages of certain digital sizes do not encrypt anything, just pure noise,
853:
1403:
1354:. I see a small amount of text information that, if brought here, could amplify
941:
870:
369:
308:
276:
267:
1784:
That requires huge lists from sender and receiver, also the messages are huge.
1536:
1219:
specifically about Arabic cryptology. We have more specialised articles (e.g.
1058:
998:
978:
970:
640:
635:
survey all the cryptography mechanisms. The problem with this is that most of
632:
624:
409:
378:
199:
1665:
There is a request for comments (RfC) that may be of interest. The RfC is at
1803:
1769:
1532:
753:
1468:
discusses encryption of a specific type. It still falls under the category
727:
based on amount of data processed (words x letters) is a misunderstanding.
150:
1596:
The last paragraph shows a product/implementation specific point of view.
1358:
article. Having useful information is a trait of a good reference, having
1161:
Somebody keeps removing the works by Ibrahim Al-kadi. Please explain why.
944:
736:
1362:
useful information, too much detail, is a trait of a good external link.
895:
797:
700:
825:
I'm restoring edits to the External links section that were reverted by
695:
Fastfission, you did the first half of the job. I did the other half: I
1674:
1673:
At issue is whether we should delete or keep the following text in the
583:
I think this should be moved to the "Message verification" subsection.
434:
90:
63:
1570:
Yes, password protection is widely accepted as a form of encryption.
1773:
1317:
Please explain why a blog link should be included at External links.
1054:
1022:
974:
966:
960:
628:
489:
Do "Stream" and "Block" really only apply to "Private Key" ciphers ?
417:
413:
240:
Illustrate general process of both public and private-key encryption.
831:
Encryption, from MysecureCyberspace's encyclopedia on cybersecurity
740:
1865:
1834:
1760:
1716:
1697:
1655:
1636:
1619:
1585:
1564:
1548:
1489:
1454:
1431:
1415:
1396:
1371:
1341:
1326:
1306:
1282:
1244:
1230:
1213:
1199:
1185:
1170:
1150:
1134:
1099:
1068:
1048:
1034:
1008:
990:
921:
903:
885:
841:
814:
804:
781:
708:
592:
533:
398:
357:
296:
749:
Of course I mean the "technical discussions" usage of the words.
1815:
delivers the key to the enemy, the other keys are safe, so our
879:
1464:
explains methods of whole disks being encrypted. For example,
556:
552:
181:
15:
149:
1688:
Your input on this question would be very much welcome. --
977:
and leaving only the intro section here. That would make
223:
217:
211:
205:
894:
Haven't you ever considered learning some English? --
835:
SecurityBulletins.com Basic Encryption testing methods
416:
are currently too similar. They should be merged, or
364:
Wiki Education Foundation-supported course assignment
303:
Wiki Education Foundation-supported course assignment
262:
Wiki Education Foundation-supported course assignment
102:, a collaborative effort to improve the coverage of
1539:, so in my book the information is not encrypted.--
973:by moving everything except the introduction to
544:I moved this recent addition here temporarily:
1900:Knowledge level-4 vital articles in Technology
8:
682:practical example of not too deciphered news
1820:
1789:
1474:In Knowledge, Encryption may refer to the
58:
1472:, but not whole disk. However, I think a
387:Template:Dashboard.wikiedu.org assignment
346:Template:Dashboard.wikiedu.org assignment
285:Template:Dashboard.wikiedu.org assignment
1925:Top-importance Computer science articles
1661:RfC concerning the Lavabit email service
981:a stub, but would solve our problem. --
385:Above undated message substituted from
344:Above undated message substituted from
283:Above undated message substituted from
60:
19:
1890:Knowledge vital articles in Technology
1827:2A02:2149:847A:1E00:9444:E682:3FB:B7E3
1796:2A02:2149:8227:A300:9444:E682:3FB:B7E3
764:is the same. But I still disagree :).
468:(shouldn't this be "assymetric key"Â ?)
405:articles should be merged, too similar
1930:WikiProject Computer science articles
474:(shouldn't this be "symmetric key"Â ?)
7:
1915:Top-importance Cryptography articles
1905:C-Class vital articles in Technology
96:This article is within the scope of
49:It is of interest to the following
1204:Ok, thanks for the clarification.
317:
313:
116:Knowledge:WikiProject Cryptography
14:
1935:WikiProject Cryptography articles
1920:C-Class Computer science articles
657:Do you think that would suffice?
424:disagree, and problems w/ diagram
119:Template:WikiProject Cryptography
1940:Knowledge pages with to-do lists
1885:Knowledge level-4 vital articles
997:I would suggest we move out the
368:
320:. Further details are available
307:
266:
189:
89:
62:
29:
20:
743:or ASCII code and many others.
136:This article has been rated as
1895:C-Class level-4 vital articles
904:16:10, 26 September 2008 (UTC)
805:16:29, 11 September 2006 (UTC)
709:16:08, 26 September 2008 (UTC)
508:Image talk:Cipher-taxonomy.png
1:
1910:C-Class Cryptography articles
1866:06:59, 8 September 2022 (UTC)
1586:15:45, 10 November 2011 (UTC)
1455:17:06, 15 February 2010 (UTC)
1100:21:28, 29 November 2007 (UTC)
1069:20:38, 29 November 2007 (UTC)
1049:11:45, 29 November 2007 (UTC)
1035:08:41, 28 November 2007 (UTC)
1009:22:13, 27 November 2007 (UTC)
991:21:31, 27 November 2007 (UTC)
752:Finally, I found out that in
593:03:02, 13 November 2013 (UTC)
158:This article is supported by
110:and see a list of open tasks.
927:History of the word 'cipher'
842:22:30, 18 October 2006 (UTC)
815:09:46, 22 October 2006 (UTC)
782:21:05, 14 January 2006 (UTC)
599:Cryptographic hash functions
534:07:46, 19 January 2006 (UTC)
399:20:34, 16 January 2022 (UTC)
358:20:42, 17 January 2022 (UTC)
297:20:42, 17 January 2022 (UTC)
161:WikiProject Computer science
1698:05:07, 29 August 2013 (UTC)
1637:17:45, 11 August 2011 (UTC)
1445:page should be merged here
945:14:57, 31 August 2007 (UTC)
871:02:31, 4 January 2007 (UTC)
846:
730:As I always understood it,
665:This does seem reasonable.
563:entry for more information.
561:Cryptographic hash function
540:Encryption: hash functions?
1956:
1422:particular one was solved?
1372:16:26, 22 April 2009 (UTC)
1342:15:23, 22 April 2009 (UTC)
1327:15:07, 22 April 2009 (UTC)
1293:and/or isn't particularly
1245:15:12, 28 April 2008 (UTC)
1231:17:12, 26 April 2008 (UTC)
1214:17:11, 26 April 2008 (UTC)
1200:16:29, 26 April 2008 (UTC)
1186:15:17, 26 April 2008 (UTC)
1171:13:30, 26 April 2008 (UTC)
1157:Ibrahim Al-kadi references
1151:13:32, 26 April 2008 (UTC)
1135:13:23, 26 April 2008 (UTC)
573:symmetric key cryptography
1835:20:08, 4 March 2018 (UTC)
1804:18:27, 4 March 2018 (UTC)
1656:03:16, 7 March 2012 (UTC)
1307:07:41, 11 July 2008 (UTC)
1283:04:36, 11 July 2008 (UTC)
691:02:18, 27 Jan 2005 (UTC)
525:09:18, 22 Aug 2004 (UTC)
437:15:12, 19 Jul 2004 (UTC)
157:
135:
84:
57:
1717:14:22, 21 May 2015 (UTC)
1620:11:20, 30 May 2011 (UTC)
1565:15:45, 1 June 2010 (UTC)
1549:09:17, 1 June 2010 (UTC)
1490:02:42, 29 May 2010 (UTC)
1480:tag should be put up. --
1432:05:31, 6 June 2009 (UTC)
1416:07:27, 1 June 2009 (UTC)
1397:19:57, 31 May 2009 (UTC)
1380:Not quite on the subject
922:02:19, 5 June 2007 (UTC)
886:02:19, 5 June 2007 (UTC)
767:What are your opinions?
669:23:54, 7 Oct 2004 (UTC)
614:21:27, 3 Oct 2004 (UTC)
579:13:14, 2 Oct 2004 (UTC)
497:09:18, 22 Aug 2004 (UTC)
99:WikiProject Cryptography
1721:
1437:Merge disk encryption ?
1221:History of cryptography
673:Text added by anon user
661:22:14, 3 Oct 2004 (UTC)
237:Revamp taxonomy diagram
1880:C-Class vital articles
1289:Because it looks like
1021:is the act of using a
965:split this article to
737:error correcting codes
565:
154:
1772:which by no means is
959:move this article to
950:Spliting this article
926:
861:comment was added by
546:
433:should reflect this.
377:. Student editor(s):
324:. Student editor(s):
275:. Student editor(s):
153:
122:Cryptography articles
36:level-4 vital article
1592:product-specific POV
1476:Full disk encryption
754:cryptography article
715:Ciphers versus codes
549:Cryptographic hashes
1507:Password protection
1466:Pretty Good Privacy
999:Etymology of cipher
847:where's sourcecode?
1817:encryption entropy
1722:You didn't mention
1313:Blog external link
788:Encryption (album)
756:the definition of
375:on the course page
322:on the course page
273:on the course page
229:Updated 2014-03-22
155:
45:content assessment
1837:
1825:comment added by
1806:
1794:comment added by
1759:random way, read
1623:
1606:comment added by
1576:comment added by
1518:comment added by
1285:
1269:comment added by
1228:
1137:
1125:comment added by
1066:
1057:and what goes in
1006:
874:
827:User:Austinmurphy
779:
502:Taxonomy approach
259:
258:
180:
179:
176:
175:
172:
171:
1947:
1846:Shaky References
1703:Added references
1622:
1600:
1588:
1527:
1495:I also disagree
1484:
1387:Anyone know how?
1264:
1226:
1120:
1064:
1004:
856:
777:
741:the Hamming code
519:usage-reflecting
401:
372:
360:
319:
315:
311:
299:
270:
230:
193:
192:
182:
142:importance scale
124:
123:
120:
117:
114:
93:
86:
85:
80:
77:
75:Computer science
66:
59:
42:
33:
32:
25:
24:
16:
1955:
1954:
1950:
1949:
1948:
1946:
1945:
1944:
1870:
1869:
1848:
1724:
1705:
1663:
1644:
1601:
1594:
1571:
1513:
1509:
1501:Disk encryption
1482:
1462:Disk encryption
1443:Disk encryption
1439:
1382:
1315:
1261:
1159:
1116:
952:
929:
914:
857:—The preceding
849:
823:
790:
717:
675:
601:
542:
504:
426:
407:
384:
366:
343:
314:13 January 2020
305:
282:
264:
255:
254:
204:
190:
121:
118:
115:
112:
111:
78:
72:
43:on Knowledge's
40:
30:
12:
11:
5:
1953:
1951:
1943:
1942:
1937:
1932:
1927:
1922:
1917:
1912:
1907:
1902:
1897:
1892:
1887:
1882:
1872:
1871:
1847:
1844:
1843:
1842:
1841:
1840:
1839:
1838:
1783:
1781:
1780:
1779:
1778:
1750:
1743:
1742:
1741:
1740:
1739:
1738:
1729:
1723:
1720:
1704:
1701:
1686:
1685:
1662:
1659:
1648:68.173.113.106
1643:
1640:
1626:
1593:
1590:
1568:
1567:
1552:
1551:
1520:209.162.45.112
1508:
1505:
1493:
1492:
1438:
1435:
1419:
1418:
1381:
1378:
1377:
1376:
1375:
1374:
1345:
1344:
1314:
1311:
1310:
1309:
1260:
1257:
1256:
1255:
1254:
1253:
1252:
1251:
1250:
1249:
1248:
1247:
1158:
1155:
1154:
1153:
1115:
1112:
1111:
1110:
1109:
1108:
1107:
1106:
1105:
1104:
1103:
1102:
1078:
1077:
1076:
1075:
1074:
1073:
1072:
1071:
994:
993:
963:
951:
948:
928:
925:
913:
910:
909:
908:
907:
906:
889:
888:
848:
845:
822:
821:External links
819:
818:
817:
789:
786:
785:
784:
716:
713:
712:
711:
685:
684:
674:
671:
663:
662:
655:
654:
653:
600:
597:
596:
595:
541:
538:
537:
536:
503:
500:
499:
498:
487:
486:
485:
484:
483:
482:
479:
470:
461:
460:
459:
456:
455:
454:
453:Rotor machines
445:
425:
422:
406:
403:
365:
362:
304:
301:
263:
260:
257:
256:
242:
241:
238:
232:
187:
185:
178:
177:
174:
173:
170:
169:
166:Top-importance
156:
146:
145:
138:Top-importance
134:
128:
127:
125:
108:the discussion
94:
82:
81:
79:Top‑importance
67:
55:
54:
48:
26:
13:
10:
9:
6:
4:
3:
2:
1952:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1877:
1875:
1868:
1867:
1863:
1859:
1855:
1852:
1845:
1836:
1832:
1828:
1824:
1818:
1813:
1812:
1811:
1810:
1809:
1808:
1807:
1805:
1801:
1797:
1793:
1785:
1777:
1775:
1771:
1768:
1762:
1758:
1754:
1753:
1751:
1748:
1747:
1746:
1736:
1735:
1733:
1732:
1730:
1726:
1725:
1719:
1718:
1714:
1710:
1702:
1700:
1699:
1695:
1691:
1684:
1680:
1679:
1678:
1676:
1671:
1670:
1666:
1660:
1658:
1657:
1653:
1649:
1641:
1639:
1638:
1634:
1630:
1629:97.83.152.148
1624:
1621:
1617:
1613:
1609:
1605:
1597:
1591:
1589:
1587:
1583:
1579:
1575:
1566:
1562:
1558:
1554:
1553:
1550:
1546:
1542:
1538:
1534:
1530:
1529:
1528:
1525:
1521:
1517:
1512:encryption.
1506:
1504:
1502:
1498:
1491:
1488:
1485:
1479:
1477:
1471:
1467:
1463:
1459:
1458:
1457:
1456:
1452:
1448:
1444:
1436:
1434:
1433:
1429:
1425:
1417:
1413:
1409:
1408:92.106.113.28
1405:
1401:
1400:
1399:
1398:
1394:
1390:
1385:
1379:
1373:
1369:
1365:
1361:
1357:
1353:
1349:
1348:
1347:
1346:
1343:
1339:
1335:
1331:
1330:
1329:
1328:
1324:
1320:
1312:
1308:
1304:
1300:
1296:
1292:
1288:
1287:
1286:
1284:
1280:
1276:
1272:
1268:
1258:
1246:
1242:
1238:
1235:Good points.
1234:
1233:
1232:
1229:
1222:
1217:
1216:
1215:
1211:
1207:
1203:
1202:
1201:
1197:
1193:
1189:
1188:
1187:
1183:
1179:
1175:
1174:
1173:
1172:
1168:
1164:
1156:
1152:
1148:
1144:
1140:
1139:
1138:
1136:
1132:
1128:
1127:67.163.141.50
1124:
1113:
1101:
1097:
1093:
1088:
1087:
1086:
1085:
1084:
1083:
1082:
1081:
1080:
1079:
1070:
1067:
1060:
1056:
1052:
1051:
1050:
1046:
1042:
1038:
1037:
1036:
1032:
1028:
1024:
1020:
1016:
1012:
1011:
1010:
1007:
1000:
996:
995:
992:
988:
984:
980:
976:
972:
968:
964:
962:
958:
957:
956:
949:
947:
946:
943:
939:
936:
932:
924:
923:
920:
912:Trim see also
911:
905:
901:
897:
893:
892:
891:
890:
887:
884:
880:
877:
876:
875:
872:
868:
864:
860:
854:
844:
843:
840:
836:
832:
828:
820:
816:
813:
809:
808:
807:
806:
803:
799:
795:
787:
783:
780:
773:
772:
771:
768:
765:
763:
759:
755:
750:
747:
744:
742:
738:
733:
728:
726:
722:
714:
710:
706:
702:
698:
694:
693:
692:
690:
683:
680:
679:
678:
672:
670:
668:
660:
656:
652:
650:
645:
644:
642:
638:
634:
630:
626:
622:
617:
616:
615:
613:
609:
605:
598:
594:
590:
586:
582:
581:
580:
578:
574:
570:
564:
562:
558:
554:
550:
545:
539:
535:
532:
528:
527:
526:
524:
520:
515:
513:
509:
501:
496:
492:
491:
490:
480:
477:
476:
475:
471:
469:
465:
464:
462:
458:Transposition
457:
452:
451:
450:Substitution
449:
448:
446:
443:
442:
441:
438:
436:
430:
423:
421:
419:
415:
411:
404:
402:
400:
396:
392:
388:
382:
380:
376:
371:
363:
361:
359:
355:
351:
347:
341:
339:
335:
331:
327:
323:
310:
302:
300:
298:
294:
290:
286:
280:
278:
274:
269:
261:
253:
249:
246:
239:
236:
235:
234:
231:
228:
225:
222:
219:
216:
213:
210:
207:
203:
201:
197:
186:
184:
183:
167:
164:(assessed as
163:
162:
152:
148:
147:
143:
139:
133:
130:
129:
126:
109:
105:
101:
100:
95:
92:
88:
87:
83:
76:
71:
68:
65:
61:
56:
52:
46:
38:
37:
27:
23:
18:
17:
1856:
1853:
1849:
1821:— Preceding
1816:
1790:— Preceding
1786:
1782:
1764:
1756:
1744:
1706:
1687:
1683:pornography.
1681:
1672:
1667:
1664:
1645:
1625:
1608:IsmaelLuceno
1602:— Preceding
1598:
1595:
1578:67.51.122.18
1572:— Preceding
1569:
1510:
1494:
1473:
1469:
1441:I think the
1440:
1420:
1386:
1383:
1359:
1355:
1316:
1271:Metamorph123
1262:
1259:hisecure.net
1160:
1117:
1018:
1014:
953:
940:
937:
933:
930:
915:
863:75.15.191.81
850:
824:
791:
769:
766:
761:
757:
751:
748:
745:
731:
729:
724:
720:
718:
696:
686:
681:
676:
667:Vancegloster
664:
649:cryptography
646:
637:Cryptography
621:Cryptography
612:Vancegloster
610:
606:
602:
585:Greatpopcorn
569:cryptography
566:
548:
547:
543:
518:
516:
511:
505:
488:
473:
472:Private Key
467:
439:
431:
427:
408:
383:
367:
342:
306:
281:
265:
250:
247:
243:
233:
226:
220:
214:
208:
194:
188:
159:
137:
113:Cryptography
104:Cryptography
97:
70:Cryptography
51:WikiProjects
34:
1728:manageable)
1557:Binksternet
1514:—Preceding
1424:Aaaronsmith
1404:book cipher
1389:Aaaronsmith
1364:Binksternet
1319:Binksternet
1265:—Preceding
1237:Binksternet
1206:85.2.112.20
1192:Binksternet
1178:85.2.112.20
1163:Binksternet
1143:Binksternet
1121:—Preceding
917:article. --
689:Fastfission
631:, and have
559:. See the
466:Public Key
1874:Categories
1537:ciphertext
1483:Mithrandir
1470:encryption
1402:This is a
1114:References
1059:encryption
1019:encryption
979:Encryption
971:Encryption
794:Encryption
641:Encryption
633:Encryption
625:Encryption
447:Classical
410:Encryption
334:Jackbelshe
330:Markscarsi
318:1 May 2020
200:Encryption
196:To-do list
1858:Zeph.tech
1770:attractor
1690:Guy Macon
1677:article:
1533:plaintext
1447:Bikepunk2
812:J Milburn
802:J Milburn
506:See also
39:is rated
1823:unsigned
1792:unsigned
1709:BadSprad
1616:contribs
1604:unsigned
1574:unsigned
1541:TedColes
1516:unsigned
1497:Rfellows
1360:too much
1334:Player82
1299:Nuwewsco
1279:contribs
1267:unsigned
1123:unsigned
942:ryanakca
859:unsigned
810:Anyone?
798:Pro-jekt
512:abstract
391:PrimeBOT
350:PrimeBOT
338:Zoharrab
326:DGC12345
289:PrimeBOT
1767:chaotic
1675:Lavabit
1487:(Talk!)
1295:notable
1225:— Matt
1063:— Matt
1041:Dijxtra
1027:Dijxtra
1003:— Matt
983:Dijxtra
776:— Matt
725:ciphers
697:deleted
531:Jobarts
463:Modern
444:Ciphers
224:refresh
212:history
140:on the
41:C-class
1774:random
1227:Crypto
1065:Crypto
1055:cipher
1023:cipher
1005:Crypto
975:Cipher
967:Cipher
961:Cipher
778:Crypto
762:cipher
659:— Matt
629:Cipher
577:— Matt
523:— Matt
495:— Matt
478:Stream
418:Cipher
414:Cipher
277:Bhale2
47:scale.
1761:chaos
1642:Short
1352:WP:RS
739:like
732:codes
721:codes
481:Block
379:Eph17
218:watch
28:This
1862:talk
1831:talk
1800:talk
1713:talk
1694:talk
1652:talk
1633:talk
1612:talk
1582:talk
1561:talk
1545:talk
1535:not
1524:talk
1451:talk
1428:talk
1412:talk
1393:talk
1368:talk
1356:this
1338:talk
1323:talk
1303:talk
1291:spam
1275:talk
1241:talk
1210:talk
1196:talk
1182:talk
1167:talk
1147:talk
1131:talk
1096:talk
1045:talk
1031:talk
987:talk
969:and
900:talk
878:Try
867:talk
770:PeP
758:code
723:and
705:talk
639:and
589:talk
571:and
555:and
412:and
395:talk
354:talk
316:and
293:talk
206:edit
198:for
1757:not
1223:).
1092:agr
1015:lot
919:agr
896:AVM
883:agr
839:agr
796:by
701:AVM
557:SHA
553:MD5
389:by
348:by
287:by
132:Top
1876::
1864:)
1833:)
1802:)
1715:)
1696:)
1654:)
1635:)
1618:)
1614:•
1584:)
1563:)
1547:)
1526:)
1453:)
1430:)
1414:)
1395:)
1370:)
1340:)
1325:)
1305:)
1297:?
1281:)
1277:•
1243:)
1212:)
1198:)
1184:)
1169:)
1149:)
1133:)
1098:)
1047:)
1033:)
989:)
902:)
881:--
869:)
800:.
760:x
707:)
687:--
591:)
575:.
435:ww
397:)
381:.
356:)
340:.
336:,
332:,
328:,
295:)
279:.
168:).
73::
1860:(
1829:(
1798:(
1776:.
1711:(
1692:(
1650:(
1631:(
1610:(
1580:(
1559:(
1543:(
1522:(
1478:.
1449:(
1426:(
1410:(
1391:(
1366:(
1336:(
1321:(
1301:(
1273:(
1239:(
1208:(
1194:(
1180:(
1165:(
1145:(
1129:(
1094:(
1043:(
1029:(
985:(
898:(
873:.
865:(
735:[
703:(
651:.
587:(
393:(
352:(
291:(
227:·
221:·
215:·
209:·
202::
144:.
53::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.