|Cryptography has been listed as a level-3 vital article in Technology. If you can improve it, please do. This article has been rated as C-Class by the WikiProject Vital Articles.|
|Cryptography is a former featured article. Please see the links under Article milestones below for its original nomination page (for older articles, check the nomination archive) and why it was removed.|
|This article appeared on Wikipedia's Main Page as Today's featured article on July 22, 2006.|
|Current status: Former featured article|
|This article is of interest to the following WikiProjects:|
| To-do list for Cryptography:
Priority 1 (top)
Sections older than 90 days may be automatically archived by .
A method used by intelligence
A method used by cyberespionage is the modular variablocks method: "variable length of encryption blocks/cryptoblocks". In this system, we don't codify a standard length of bit-quanta, instead inside the key there is a code of the pattern block-change. It is safer to use a separate key in order to select (algorithmically) a variablock pattern. All users of this encryptive method should know beforehand the algorithms of the variable bit-quanta. Also if we have 30 different sizes of bit-quanta, we need 30 different encryptional vocabularies for the translation (they can be algorithmically related; if they are not related, the system is safer, but you have to use more keys). This system has some problems though. 1. you might have to use two or more keys, 2. if your message has noise you might lose the correct pattern of bit-length-variation, you can protect your message from noise by adding one more layer of anti-noise transcription, but that makes your message longer
If you design it carefully it works just fine, but you have to apply anti-noise encoding, otherwise you might lose track of the variable sections. Remember, variable sections means variable cryptographic dictionary. You must create great algorithms, otherwise it won't work well! It's a very old method, but great (if programmed well)!
- simple English: Hell_i|s_empty_a|nd_all_t|he|_dev|i|ls_are_|here. (6-9-8-2-4-1-7-5-etc... modular variablock section, each number of digits per section corresponds to a different cryptodictionary, even the result can be of variable block length, but you then need more keys and more anti-noise layers)
- We deliver some key components via different e-mails, some via-different telephones and some face to face at many meetings, also we deliver separately the order of usage. Lazy people deliver one finalized huge key, and everybody reads their messages.
- If you rotate the same bit-widths in exact order, infiltrators might be able to find your partition pattern either your message. The whole point is to complicate the order, but that might cause problems to the sender if (s)he's a bad programmer. If you're Japanese it always works!
- And the most important thing is that we add meaningless random digits at certain (pseudorandom-dedicated) partitions the algorithm dedicates for randomness. That also might cause some problems. If your noise is thoroughly random, the infringer might understand some bit-width partition sections. We use pseudorandom algorithms, in order the result is "natural". Do it well, or don't do it at all! It saves or betrays you!!! (we know which partitions have pseudorandom digits, and we simply delete these)
- Each bit-width corresponds to many different bit-width encoded dictionaries. This method creates huge dictionaries with many languages that have different widths for the same input. You don't have to know all the codes beforehand. Algorithms do it for you. It still remains a big-data option, but it works fine if programmed well. This system has huge hidden entropy. We never repeal the whole pattern of our systemic entropy, because we use many "cryptolanguages" and we only know how we apply each one. And that code doesn't always work. A Russian girl fucks an agent. No crypt-anal-ysis needed.
- Before we do that, we encrypt our message with other methods. Always use many layers of different methods of encryption.
"Applied Cryptography" listed at Redirects for discussion
Book added in bibliography bug
I added a book in the bibliography but there is a bug with the ISBN number.
Could someone tell me how to fix this problem ?
Cryptographic Hash Functions
The article's description and categorization of cryptographic hash functions is currently incorrect. Cryptographic hash functions can be used in either symmetric or asymmetric encryption and are essentially kinds of keys. The 'symmetric' vs. 'asymmetric' distinction refers to how the keys are shared, if they're shared at all. CessnaMan1989 (talk) 17:31, 7 September 2021 (UTC)
Added sections "Applications" and "Social issues" + split request
few weeks year ago, technically (how time flies!), I added the sections "Applications" and "Social issues" to this article per User:Nageh's feedback on the 2011 featured article review. Though I was able to add a lot of stuff to the Applications section (and I'm we're hardly getting started!), the various applications of cryptography is a vast topic (as evidenced, for example, by the sheer size of Category:Applications of cryptography) and so deserves its own article. Therefore, I propose that this section be expanded and then split into another article titled Applications of cryptography.
I also added the section "Social issues". However, I have no idea what to put in it, so I left it blank. (Presumably, it should have enough stuff that it would have to be a mere summary of another article titled Social issues of cryptography, but that's another story.) I would ask Nageh himself, but, alas, it seems that he left Wikipedia in 2013 due to excessive wikidrama. Duckmather (talk) 18:42, 2 January 2022 (UTC)
- Because I am That Kind of Person™, I asked GPT-J (on default creativity settings) to imagine the contents of the (as of now hypothetical) Wikipedia article titled Social issues of cryptography. In response, I got an essay with a brilliant lead sentence ("The social issues of cryptography are the study of cryptographic technology and its interactions with society.") but which then degrades into an inane discussion of public policy and various applications of cryptography (it starts going into a tangent about electronic voting, which is where I cut generation off). I tried this several times with different models and creativity settings and got similar results each time. Absolutely useless. [original research]
- At least, in the featured article review, User:Tijfo098 refers to Nageh with male pronouns.