Jump to content

Talk:Wadsworth's cipher: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
m assess
Noting two serious problems
Line 36: Line 36:
|US= yes
|US= yes
}}
}}

== Serious problems ==
I would like to mention two issues with this article.

Firstly, regarding its first reference (cited as [http://all.net/edu/curr/ip/Chap2-1.html|"A Short History of Cryptography"], Fred Cohen, 1995; but that is actually only one chapter of an entire on-line book.) The entire second paragraph of this article is copied almost verbatim from Dr. Cohen's copyrighted article. Only a few words are modifed here and there, such as replacing "several" with "a few".

Second, the actual description of the cipher seems to copy an error in Dr. Cohen's article. Specifically,
:''To encipher a message, the inner disk was turned until the desired letter was at the top position, with the '''''number of turns required''''' for the result transmitted as ciphertext.'' (Emphasis added.)

This description frankly makes little sense. Not only is it cumbersome, but it does not allow a unique decipherment. It also leaves the second disk unused! Further, it is completely unlike the operation of the Wheatstone cryptograph, even though all sources agree that the two instruments are almost identical (differing only in the size of the larger disk.) In Wheatstone's machine, once the inner disk has been turned, the ciphertext is simply read off from the index on the outer disk, precisely as you might expect. (See, for example, [http://books.google.com.au/books?id=m65tKWiI-MkC&pg=PA170&lpg=PA170&dq=%22Wheatstone+cryptograph%22&source=bl&ots=-QN8d9_4lK&sig=4vbj-2GY1TpfU3HpvhB0r7WbwCs&hl=en&sa=X&ei=j3EsUdejEISUiAff6YD4Bg&redir_esc=y#v=onepage&q=%22Wheatstone%20cryptograph%22&f=false].)

Unfortunately, the only source I can find which purports to accurately examine and describe a Wadsworth cipher machine, is behind a very expensive paywall.
-- [[Special:Contributions/202.63.39.58|202.63.39.58]] ([[User talk:202.63.39.58|talk]]) 11:28, 26 February 2013 (UTC)

Revision as of 11:28, 26 February 2013

Please add {{WikiProject banner shell}} to this page and add the quality rating to that template instead of this project banner. See WP:PIQA for details.
WikiProject iconMilitary history: Intelligence / Technology / North America / United States Stub‑class
WikiProject iconThis article is within the scope of the Military history WikiProject. If you would like to participate, please visit the project page, where you can join the project and see a list of open tasks. To use this banner, please see the full instructions.
StubThis article has been rated as Stub-class on the project's quality scale.
Associated task forces:
Taskforce icon
Intelligence task force
Taskforce icon
Military science, technology, and theory task force
Taskforce icon
North American military history task force
Taskforce icon
United States military history task force

Serious problems

I would like to mention two issues with this article.

Firstly, regarding its first reference (cited as "A Short History of Cryptography", Fred Cohen, 1995; but that is actually only one chapter of an entire on-line book.) The entire second paragraph of this article is copied almost verbatim from Dr. Cohen's copyrighted article. Only a few words are modifed here and there, such as replacing "several" with "a few".

Second, the actual description of the cipher seems to copy an error in Dr. Cohen's article. Specifically,

To encipher a message, the inner disk was turned until the desired letter was at the top position, with the number of turns required for the result transmitted as ciphertext. (Emphasis added.)

This description frankly makes little sense. Not only is it cumbersome, but it does not allow a unique decipherment. It also leaves the second disk unused! Further, it is completely unlike the operation of the Wheatstone cryptograph, even though all sources agree that the two instruments are almost identical (differing only in the size of the larger disk.) In Wheatstone's machine, once the inner disk has been turned, the ciphertext is simply read off from the index on the outer disk, precisely as you might expect. (See, for example, [1].)

Unfortunately, the only source I can find which purports to accurately examine and describe a Wadsworth cipher machine, is behind a very expensive paywall. -- 202.63.39.58 (talk) 11:28, 26 February 2013 (UTC)[reply]