Talk:Affine cipher

WikiProject Cryptography / Computer science  (Rated C-class, Low-importance)
This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C  This article has been rated as C-Class on the quality scale.
Low  This article has been rated as Low-importance on the importance scale.

Good changes thus far. I really like the python script you added for the encryption method. One thing that would be nice would be if you tried to make it a little less esoteric, or even better, supplement the really esoteric parts with further explanations of the concepts. Good stuff otherwise. --Arjun X3nodox (talk) 04:31, 14 April 2009 (UTC)

Stuart-I think that the changes you have made to the page on the Affine Cipher are good. I like that you added the examples for encryption and decryption because it makes it much easier to understand how the cipher works. The only part of that section that I think is a bit confusing is why the numbers 5 and 8 are chosen for that formula. If you know why, maybe you could find a way to just explain that on the page. I also couldn't tell if you were the one who added the section on the weaknesses, but that section is good and should remain on the page. The only other information I would add to the page is maybe how the cipher first came about (who created it or when the cipher was first used) if you happen to know these details. ~Sam~ 123samantha (talk) 21:04, 13 April 2009 (UTC)

So, is this cipher actually secure or not? The article is ambiguous --Az 19:17, 18 October 2006 (UTC)

Not: monoalphabetic substitution ciphers are normally quite insecure. The article references substitution cipher for more detail on the security of these sorts of schemes. — Matt Crypto 19:28, 18 October 2006 (UTC)

286?

Where does the number 286 come from for non-trivial English affine ciphers? 72.197.74.80 (talk) 04:55, 10 August 2008 (UTC)

Development?

Who developed this cipher, and where has it been used? By the way the Examples section seems to be lifted from the handout in the References. Not sure if that is okay... Rofflebuster (talk) 14:56, 13 April 2009 (UTC)

~Sam~ The reasons why 5 & 8 are chosen for the example are these. The number 5 is a coprime of 26, which is the modulo. Coprime is a pair of numbers whose Greatest Common Divisor is 1. Being 5 → 1 and 5; 26 → 1, 2, 13, and 26. If you do not use a coprime number of your modulo, you won't be able to decipher your ciphertext because you cannot get the multiplicative inverse modulo of $a$.

Number 8 is just a random number chosen to shift the letters, like in Ceasar's Cipher. Actually you can omitt this or give it a value of 0 but do not use 1 as your value for $a$ because your plaintext won't be enciphered. Karyuudo Ketsueki (talk) 14:22, 17 April 2009 (UTC)