Talk:Encryption
This is the talk page for discussing improvements to the Encryption article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: Index, 1Auto-archiving period: 90 days |
To-do list for Encryption:
I believe that the first three words regarding cryptography have it backwards. Cryptographic protocols are a subset of encryption, not the other way around. Where, before computers, the distinction wasn't instructive, it is now. When I was provided the hyperbolic phrase, cryptographic encryption, it had a dissonance, because it was in the past redundant, and today, plain wrong. Encryption is the larger matter, various cryptographic schemes are a subset. But to simply re-write that, In encryption, cryptography etc etc does a huge injustice to clarity. Perhaps, Cryptography is a manner of encryption which employs an express protocol intended to... Maybe there can be a phrase to modify protocol, so we don't encrypt this revised definition. But this needs a discerning eye because physics and computer geeks are misusing this term by the second. ---- |
This level-4 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
Index
|
|
This page has archives. Sections older than 90 days may be automatically archived by ClueBot III when more than 5 sections are present. |
Short
[edit]I removed the table of contents from this article because I felt it was distracting and served no purpose (there's no subsections!). Please add subsections! 68.173.113.106 (talk) 03:16, 7 March 2012 (UTC)
RfC concerning the Lavabit email service
[edit]There is a request for comments (RfC) that may be of interest. The RfC is at
At issue is whether we should delete or keep the following text in the Lavabit article:
- Before the Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user Joey006@lavabit.com for alleged possession of child pornography.
Your input on this question would be very much welcome. --Guy Macon (talk) 05:07, 29 August 2013 (UTC)
Added references
[edit]I've found articles for the needed citations. I will be removing the additional citations needed tag. BadSprad (talk) 14:22, 21 May 2015 (UTC)
You didn't mention
[edit]- each piece of information has a list of possible encryptions, Alice and Bob (sender and receiver) know that list, a randomizer picks a random synonymous encryption (that causes encryptions to be large, but are manageable)
- the size of the encryption output is variable, each information has lists of synonymous encryptions of many sizes of digits, each size-list must contain as many as possible synonymous encryptions
- the reader of the message, must have a secondary key, to know the order of the digital fragmentation packages
- ⚠ many packages of certain digital sizes do not encrypt anything, just pure noise,
- the reader of the message, must have a secondary key, to know the order of the digital fragmentation packages
you have to dedicate many digit-sizes to noise, otherwise Eve the eavesdropper might find some patterns.
- typical and statistically common phrases are coded as one piece of information, they're not fragmented into separate letters
- (this is problematic, it's not used because it reveals statistics about your letters, also can lead to permanent informational loss) some consciously made spelling mistakes might help you hide better you message but the orthographic mistakes must be selected by a computer because humans are bad randomizers
- (there is a myth that monkeys are good randomizers, a pure myth, monkeys neurotically press a range of buttons in a chaotic but not random way, read chaos, animals are bad randomizers and they can never type the Bible even after eternal infinities, because are restricted by their "envelope of chaos" function, their attractor. Monkeys cannot type the Bible, even after eternal infinities, because they are restricted by their chaotic attractor which by no means is random.
That requires huge lists from sender and receiver, also the messages are huge.
It has been used by the US, China and Russia (combined usually with 3 or more other encryptions) but you must have a clear line or preferably a cable (fiber optics). It's bad for space because it's slow, and if you make your lists smaller, then it's faster but anyone can decrypt your message. — Preceding unsigned comment added by 2A02:2149:8227:A300:9444:E682:3FB:B7E3 (talk) 18:27, 4 March 2018 (UTC)
- you have to shuffle your lists, you need huge keys, it works (you don't write them by hand but then someone may steal the key, some people use several keys, and different security units handle them, they aren't allowed to communicate with each other, only with the commander. If one security group delivers the key to the enemy, the other keys are safe, so our encryption entropy. Even the commander isn't supposed to know all the details, only the generic management. (secrets leak outside the system, people don't play all day long with technology... some have sex with unknown people..... encryption won't help then) — Preceding unsigned comment added by 2A02:2149:847A:1E00:9444:E682:3FB:B7E3 (talk) 20:08, 4 March 2018 (UTC)
Shaky References
[edit]Reference 2, "History of Cryptography" is from Binance Academy, with no further sources at the reference source. Not sure where binance gets their info from, but this source is essentially just "dude trust me".
While I don't really doubt the truth of this claim, can we get a better source for early encryption and cryptographic history other than a binance article?
- Wikipedia pages with to-do lists
- C-Class level-4 vital articles
- Wikipedia level-4 vital articles in Technology
- C-Class vital articles in Technology
- C-Class Cryptography articles
- Top-importance Cryptography articles
- C-Class Computer science articles
- Top-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles