|Cryptography is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed.|
|This article appeared on Wikipedia's Main Page as Today's featured article on July 22, 2006.|
|Cryptography has been listed as a level-3 vital article in Technology. If you can improve it, please do. This article has been rated as B-Class.|
|This article is of interest to the following WikiProjects:|
|It is intended that this article be included in WikiReader Cryptography, a WikiReader on the topic of cryptography. Help and comments for improving this article would be especially welcome. A tool for coordinating the editing and review of these articles is the daily article box.|
|To-do list for Cryptography:|
|Priority 1 (top)|
|Threads older than 90 days may be archived by.|
The article is misleading to the reader in that it confuses cryptography with cryptology (and in fact it suggests that cryptoanalysis is a part of cryptography). I know it's been already discussed zillion times before through the wikipedia history, and different editors have various ideas, possibly there are even some differences in the popular American vs British usage but still it stays confusing. Can we make the distinction clear, based on strong linguistic sources rather than individual editors' opinions ? Similar confusion is common in other languages, still most other wikis have this already properly handled. --Lysytalk 19:00, 24 September 2011 (UTC)
- Hence the expression "cryptographic attack" would be an oxymoron. But a quick search on Google scholar shows that the expression can be found in over 500 papers. This clearly indicates that even the experts do not always distinguish between the terms cryptography and cryptology. Wikipedia should merely state how a term is used and not try to correct rsp. redefine it. At the moment the article seems to achieve this reasonably well. 126.96.36.199 (talk) 20:25, 24 September 2011 (UTC)
Classical method may outperform quantum cryptography
I recently stumbled across this and it may prove to be necessary to add information regarding this subject in the future, however at present I am not sure if there is enough information to comment on it in any article yet. http://arxiv.org/abs/1206.2534 188.8.131.52 (talk) 13:43, 17 June 2012 (UTC)
- There is a wikipedia article on the Kish cypher, which might be related to the paper you mention above. 184.108.40.206 (talk) 14:46, 17 June 2012 (UTC)
Cryptography with Biometrics
Cryptography and Biometrics The procedure of cryptography comprises of key generation. The key is generated from a subject’s biometric image with the help of error-correction algorithms, which do not reveal the key, and can be saved in a tamper-resistant token such as a smart card. The reproduction of the key depends on two factors: the subject’s image and the token. The attacker has to procure both of them to compromise the key.
A number of researchers have studied the interaction between biometrics and cryptography, two potentially complementary security technologies. Biometrics is about measuring unique personal features, such as a subject’s voice, fingerprint, or iris. It has the potential to identify individuals with a high degree of assurance, thus providing a foundation for trust. Cryptography, on the other hand, concerns itself with the projection of trust: with taking trust from where it exists to where it is needed.
The main obstacle to algorithmic combination is that biometric data are noisy; only an approximate match can be expected to a stored template. Cryptography, on the other hand, requires that keys be exactly right, or protocols will fail. For that reason, previous product offerings have been based on specific hardware devices. It would be better to have a more general, protocol-level approach, combining cryptography and biometrics. Yet another consideration is privacy. Many users may be reluctant to have biometric data stored on central databases; and there may be less resistance to biometric technology if users can be credibly assured that their templates are not stored centrally (or, perhaps, at all).
How it works. Firstly (Enroll): In this subject enrolls the number of scanned image. It can be Iris, fingerprint, voice etc. This sample is stored in the database and is used for matching and key generation procedure.
Secondly (Key generation): The key is generated using biometric sample which is used in cryptography.
Third (Cryptography): In this message is encrypted using generated key. This process is employed before sending of message. User side: encryption of message using key and receiver’s key. Receiver side: decryption of message using the receiver key through biometric scan.
Biometric Key Generation BKGs are generally composed of two algorithms, an enrollment algorithm (Enroll) and a key-generation algorithm (Key Gen):
• Enroll (B1, . . . , Bℓ): The enroll algorithm is a probabilistic algorithm that accepts as input a number of biometric samples (B1, . . . , Bℓ), and outputs a template (T) and a cryptographic key (K). In the event that B1, . . . , Bℓ do not meet some predetermined criteria, the enroll algorithm might output the failure symbol ⊥.
• Key Gen (B, T): The key generation algorithm accepts as input one biometric sample (B), and a template (T). The algorithm outputs either a cryptographic key (K), or the failure symbol ⊥ if B cannot be used to create a key. The enrollment algorithm estimates the variation inherent to a particular user’s biometric reading and computes information needed to error-correct a new sample that is sufficiently close to the enrollment samples. Enroll encodes this information into a template and outputs the template and the associated key. The key-generation algorithm uses the template output by the enrollment algorithm and a new biometric sample to output a key. If the provided sample is sufficiently similar to those provided during enrollment, then Key Gen and Enroll output the same keys. Vinit2jain (talk) 17:36, 30 October 2012 (UTC)
First line and lead section references to "adversaries"
I think considering the weight of cryptography's current use with respect to mathematics - the study of codes or encoded messages - is closer to the heart of the meaning of the term. While codes evolved in history as a wartime tool, which lends itself to the idea that adversaries and evading detection are core of the definition, I think "cryptography" as a subject has been reclaimed by academia, culture, and modernity. Modern uses of cryptography include ssh keys, Bitcoin, barcodes and QR codes, etc. Andrevan@ 16:54, 28 November 2013 (UTC)