From Wikipedia, the free encyclopedia
Jump to: navigation, search

This page is for the discussion of a WikiReader on the topic of Cryptography. Feel free to help out, even if you don't know much about cryptography.

well The story so far is that...: We've had some discussion about scope (see /Phase I), and we've agreed to "target a general readership, and have also agreed on include articles of general interest and relevance, and exclude articles which are (a) very technical and likely to be incomprehensible (e.g. General number field sieve); (b) of little relevance to the non-specialist (e.g. Madryga and the "Catalog of block ciphers"...).". We've also selected a working Table of Contents (see /Phase II), which gives us something to work with, but isn't set in stone.

What's happening now: We are running an "Article of the Day" scheme which loops through all of the articles in the table of contents in a random order. Hopefully by the nth iteration, the articles will be up to scratch. There may also be some refinement of the Table of Contents (TOC). There's also a master to-do list. — Matt 05:32, 22 Nov 2004 (UTC)


  • Phase I (June 11& n dash;June 23): Decide scope, criteria for acceptance, vague timescale, advertise proposal.
  • Phase II (June 24-July 28): Select the articles for inclusion.
  • Phase III: Polish the articles like crazy.
    • III.1 : Run an Article a Day scheme.
    • III.2 : Fix up articles which still need work; invite outside experts to review
  • Phase IV : Freeze selection (obviously, not the Wikipedia versions..). Maneouvre articles into PDF form; add boilerplate; distribution!

Current mockup: WikiReader Cryptography: 18th July, 2004 (1.9M PDF) (on the order of 70,000 words).

General discussion[edit]

Please direct discussion to the associated Talk page: Wikipedia talk:WikiReader/Cryptography; thanks!

Article of the day[edit]

Use {{WikiReaderCryptographyAOTD-Verbose}} to put this on your own user page.

WikiReader Cryptography — article of the day edit
Sunday, 24 July Playfair cipher (Talk) (History)
Monday, 25 July Message authentication code (Talk) (History)
Tuesday, 26 July Digital signature (Talk) (History)
Wednesday, 27 July Block cipher modes of operation (Talk) (History)
Thursday, 28 July Export of cryptography (Talk) (History)
Notes: If you find problems that you can't fix (or it's too much effort), it would be very helpful if you could place a note on the Talk: page. Articles need to be checked for 1) Accuracy (Factchecking: Are there any mistakes? Is the writing precise? Are sources cited?), 2) Completeness (Any obvious omissions? Does it need illustration?) 3) Quality of writing (Copyedits: Grammar and spelling, phrasing, structure) 4) Neutrality (Is it written from the NPOV? Do we document all relevant points of view?) — Thanks!
Clipboard.svgTo-do list for Digital signature edit
  • Describe cryptanalysis of digital signatures -- what are the various notions of security for a signature scheme?
  • Mention the common association of message encryption with digital signatures.
(See all to-do lists for this WikiReader)

Working table of contents (73 articles)[edit]

  1. General concepts
    1. Cryptography
    2. Cryptanalysis
    3. Plaintext
    4. Encryption
    5. Key (cryptography)
    6. Code (cryptography)
    7. Secure channel
    8. Brute force attack
    9. Key size
    10. Cryptographic protocol
  2. History of cryptography
    1. History of cryptography
    2. Timeline of cryptography
    3. Classical cryptography
      1. Classical cipher
      2. Substitution cipher
      3. Transposition cipher
      4. Frequency analysis
      5. Vigenère cipher
      6. Playfair cipher
      7. Caesar cipher
      8. Polyalphabetic cipher
      9. Straddling checkerboard
    4. Rotor machines, WWII-era
      1. Rotor machine
      2. Enigma machine
      3. Cryptanalysis of the Enigma
      4. M-209
      5. PURPLE
      6. Colossus computer
      7. Ultra
    5. Important folk
      1. Alan Turing
      2. Claude E. Shannon
      3. William F. Friedman
    6. Other
      1. Export of cryptography
      2. National Security Agency
      3. Government Communications Headquarters
      4. Examples (famous / infamous)
        1. Zimmermann Telegram
        2. Voynich manuscript
  3. Symmetric key cryptography
    1. Symmetric Encryption
      1. Block cipher
      2. Data Encryption Standard
      3. Advanced Encryption Standard
      4. RC5
      5. International Data Encryption Algorithm
      6. Blowfish (cipher)
      7. Stream cipher
      8. RC4
      9. Substitution box
      10. Block cipher modes of operation
      11. Linear cryptanalysis
      12. Differential cryptanalysis
    2. Hash functions
      1. Cryptographic hash function
      2. MD5
      3. SHA family
      4. Message authentication code
      5. HMAC
  4. Asymmetric key cryptography
    1. Asymmetric key algorithm
    2. Public-key cryptography
    3. RSA
    4. Digital signature
    5. Pretty Good Privacy
    6. Diffie-Hellman key exchange
    7. Digital Signature Algorithm
    8. Public key infrastructure
    9. Certificate authority
    10. Key management
    11. Elliptic curve cryptography
  5. Misc
    1. One-time pad
    2. Quantum cryptography
    3. Secure multiparty computation
    4. Threshold shadow scheme
    5. Oblivious transfer
    6. Transport Layer Security
    7. Virtual private network
    8. Secure shell
    9. Secret sharing
    10. ROT13
    11. Transport Layer Security
    12. Side channel attack
    13. Snake oil (cryptography)

To do's[edit]

See the master to-do list.