Cryptography is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed. | ||||||||||||||||
This article appeared on Wikipedia's Main Page as Today's featured article on July 22, 2006. | ||||||||||||||||
| ||||||||||||||||
Current status: Former featured article |
This
level-3 vital article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
To-do list for Cryptography:
"Distinguish between the essential aspects and variations of"Science", "Engineering", "Philosophy", Application" and "Management" of cryptography because the language, contexts and perspectives are complicated and different.. Roy D. Follendore III ( talk) 14:15, 16 August 2019 (UTC) Priority 1 (top)
|
Text and/or other creative content from this version of Cryptography was copied or moved into Cryptography law with this edit. The former page's history now serves to provide attribution for that content in the latter page, and it must not be deleted as long as the latter page exists. |
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present. |
A method used by cyberespionage is the modular variablocks method: "variable length of encryption blocks/cryptoblocks". In this system, we don't codify a standard length of bit-quanta, instead inside the key there is a code of the pattern block-change. It is safer to use a separate key in order to select (algorithmically) a variablock pattern. All users of this encryptive method should know beforehand the algorithms of the variable bit-quanta. Also if we have 30 different sizes of bit-quanta, we need 30 different encryptional vocabularies for the translation (they can be algorithmically related; if they are not related, the system is safer, but you have to use more keys). This system has some problems though. 1. you might have to use two or more keys, 2. if your message has noise you might lose the correct pattern of bit-length-variation, you can protect your message from noise by adding one more layer of anti-noise transcription, but that makes your message longer
If you design it carefully it works just fine, but you have to apply anti-noise encoding, otherwise you might lose track of the variable sections. Remember, variable sections means variable cryptographic dictionary. You must create great algorithms, otherwise it won't work well! It's a very old method, but great (if programmed well)!
The article's description and categorization of cryptographic hash functions is currently incorrect. Cryptographic hash functions can be used in either symmetric or asymmetric encryption and are essentially kinds of keys. The 'symmetric' vs. 'asymmetric' distinction refers to how the keys are shared, if they're shared at all. CessnaMan1989 ( talk) 17:31, 7 September 2021 (UTC)
A few weeks year ago, technically (how time flies!), I
added the sections "Applications" and "Social issues" to this article per
User:Nageh's feedback on the
2011 featured article review. Though I was able to add a lot of stuff to the Applications section (and I'm we're hardly getting started!), the various applications of cryptography is a vast topic (as evidenced, for example, by the sheer size of
Category:Applications of cryptography) and so deserves its own article. Therefore, I propose that this section be expanded and then split into another article titled
Applications of cryptography.
I also added the section "Social issues". However, I have no idea [1] what to put in it, so I left it blank. (Presumably, it should have enough stuff that it would have to be a mere summary of another article titled Social issues of cryptography, but that's another story.) I would ask Nageh himself, but, alas, it seems that he left Wikipedia in 2013 [2] due to excessive wikidrama. Duckmather ( talk) 18:42, 2 January 2022 (UTC)
Duckmather ( talk) 18:42, 2 January 2022 (UTC)
Did you guys know about this code? If not, you set up a square that has five letters in a row, then you set up five rows on it. Then you place certain letters in it that has dual sounds in it, such as C, G, Y in it to replace certain other letters in it. Here is a example:
A B C D E F G H I L M N O P Q R T U V W X Z J K Y
From this, you tap(on a excellent sound conducting surface, like a pipe), for the letter Q, tap five times, wait for one sec.,tap three times. You repeat this, only you adjust what you are doing for each letter as you spell out your words. In this one, the letter C will be used for the letter S. This was created by shot down US POWs who ended up in the Hanoi Hilton, a Viet Nam prison camp. This was in a print issue of The Readers Digest. I can't source this at this time. Some of the issues referred to what happened in Viet Nam, during the Viet Nam War, and this cipher system was in these articles. There are variations of this system, all created to confuse the Vietnamese guards.
How is pre ISBN, pre Internet, print media sourced for Wikipedia? Thanks. Wikipedia is the best. 😘🥰 Nuclear Sergeant ( talk) 09:35, 15 July 2023 (UTC)
Do we have to have a working phone to do this is it all done through the network as long as you have a Wi-Fi network or some sort to use it and what is the encryption technology 256 or what 71.219.144.28 ( talk) 19:27, 29 September 2023 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 22 August 2023 and 11 December 2023. Further details are available on the course page. Student editor(s): Mayoosan ( article contribs). Peer reviewers: Chillimune.
— Assignment last updated by Chillimune ( talk) 01:58, 12 December 2023 (UTC)
Cryptography is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed. | ||||||||||||||||
This article appeared on Wikipedia's Main Page as Today's featured article on July 22, 2006. | ||||||||||||||||
| ||||||||||||||||
Current status: Former featured article |
This
level-3 vital article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
To-do list for Cryptography:
"Distinguish between the essential aspects and variations of"Science", "Engineering", "Philosophy", Application" and "Management" of cryptography because the language, contexts and perspectives are complicated and different.. Roy D. Follendore III ( talk) 14:15, 16 August 2019 (UTC) Priority 1 (top)
|
Text and/or other creative content from this version of Cryptography was copied or moved into Cryptography law with this edit. The former page's history now serves to provide attribution for that content in the latter page, and it must not be deleted as long as the latter page exists. |
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present. |
A method used by cyberespionage is the modular variablocks method: "variable length of encryption blocks/cryptoblocks". In this system, we don't codify a standard length of bit-quanta, instead inside the key there is a code of the pattern block-change. It is safer to use a separate key in order to select (algorithmically) a variablock pattern. All users of this encryptive method should know beforehand the algorithms of the variable bit-quanta. Also if we have 30 different sizes of bit-quanta, we need 30 different encryptional vocabularies for the translation (they can be algorithmically related; if they are not related, the system is safer, but you have to use more keys). This system has some problems though. 1. you might have to use two or more keys, 2. if your message has noise you might lose the correct pattern of bit-length-variation, you can protect your message from noise by adding one more layer of anti-noise transcription, but that makes your message longer
If you design it carefully it works just fine, but you have to apply anti-noise encoding, otherwise you might lose track of the variable sections. Remember, variable sections means variable cryptographic dictionary. You must create great algorithms, otherwise it won't work well! It's a very old method, but great (if programmed well)!
The article's description and categorization of cryptographic hash functions is currently incorrect. Cryptographic hash functions can be used in either symmetric or asymmetric encryption and are essentially kinds of keys. The 'symmetric' vs. 'asymmetric' distinction refers to how the keys are shared, if they're shared at all. CessnaMan1989 ( talk) 17:31, 7 September 2021 (UTC)
A few weeks year ago, technically (how time flies!), I
added the sections "Applications" and "Social issues" to this article per
User:Nageh's feedback on the
2011 featured article review. Though I was able to add a lot of stuff to the Applications section (and I'm we're hardly getting started!), the various applications of cryptography is a vast topic (as evidenced, for example, by the sheer size of
Category:Applications of cryptography) and so deserves its own article. Therefore, I propose that this section be expanded and then split into another article titled
Applications of cryptography.
I also added the section "Social issues". However, I have no idea [1] what to put in it, so I left it blank. (Presumably, it should have enough stuff that it would have to be a mere summary of another article titled Social issues of cryptography, but that's another story.) I would ask Nageh himself, but, alas, it seems that he left Wikipedia in 2013 [2] due to excessive wikidrama. Duckmather ( talk) 18:42, 2 January 2022 (UTC)
Duckmather ( talk) 18:42, 2 January 2022 (UTC)
Did you guys know about this code? If not, you set up a square that has five letters in a row, then you set up five rows on it. Then you place certain letters in it that has dual sounds in it, such as C, G, Y in it to replace certain other letters in it. Here is a example:
A B C D E F G H I L M N O P Q R T U V W X Z J K Y
From this, you tap(on a excellent sound conducting surface, like a pipe), for the letter Q, tap five times, wait for one sec.,tap three times. You repeat this, only you adjust what you are doing for each letter as you spell out your words. In this one, the letter C will be used for the letter S. This was created by shot down US POWs who ended up in the Hanoi Hilton, a Viet Nam prison camp. This was in a print issue of The Readers Digest. I can't source this at this time. Some of the issues referred to what happened in Viet Nam, during the Viet Nam War, and this cipher system was in these articles. There are variations of this system, all created to confuse the Vietnamese guards.
How is pre ISBN, pre Internet, print media sourced for Wikipedia? Thanks. Wikipedia is the best. 😘🥰 Nuclear Sergeant ( talk) 09:35, 15 July 2023 (UTC)
Do we have to have a working phone to do this is it all done through the network as long as you have a Wi-Fi network or some sort to use it and what is the encryption technology 256 or what 71.219.144.28 ( talk) 19:27, 29 September 2023 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 22 August 2023 and 11 December 2023. Further details are available on the course page. Student editor(s): Mayoosan ( article contribs). Peer reviewers: Chillimune.
— Assignment last updated by Chillimune ( talk) 01:58, 12 December 2023 (UTC)