Citizendium - a community developing a quality, comprehensive compendium of knowledge, online and free.
Click here to join and contribute
CZ thanks our previous donors. Donate here. Treasurer's Financial Report

User:Sandy Harris/Articles

From Citizendium
Jump to: navigation, search

For many of these articles, I am the main or only writer to date.

General crypto & security

  • Developing Article Block cipher: A symmetric cipher that operates on fixed-size blocks of plaintext, giving a block of ciphertext for each [e]
  • Developing Article Stream cipher: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]
  • Approved Article Kerckhoffs' Principle: The principle, formulated by Auguste Kerckhoffs, that security in a cipher should not depend on keeping the details of the cipher secret; it should depend only on keeping the key secret. [e]
  • Developing Article Cypherpunk: People interested in cryptography as a tool for privacy, anonymity and social change. [e]
  • Stub FreeSWAN: A Linux implementation of the IPsec protocols, intended to make wholesale monitoring of the Internet impossible. [e]
  • Stub Hash (cryptography): An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
  • Developed Article AES competition: A competition run by the US National Institute of Standards and Technology to chose a block cipher to become the Advanced Encryption Standard. [e]
  • Developed Article RSA algorithm: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]
  • Developing Article Diffie-Hellman: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • Stub Digital signature: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
  • Stub Hybrid cryptosystem: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
  • Developing Article Alice and Bob: Traditional names for A and B, the two players, in discussion of cryptography or coding theory. [e]
  • Stub Wired Equivalent Privacy: The original standard for encryption of wireless networks, fatally flawed. [e]
  • Developing Article Wi-Fi Protected Access: WPA, the encryption used in later versions of IEEE 802.11 wireless networking. [e]
  • Stub Challenge-response protocol: An authentication method involving a random challenge, different each time. [e]
  • Developing Article Snake oil (cryptography): Describes the manufacture and sale of information security products which instill in the consumer a false sense of security, because in reality the product does not make the information any more secure [e]


  • Developing Article Active attack: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
  • Developing Article Passive attack: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
  • Developing Article Brute force attack: An attempt to break a cipher by trying all possible keys; long enough keys make this impractical. [e]
  • Stub Algebraic attack: Attacking a cipher by writing equations that describe its operation, then solving for the key. [e]
  • Developing Article Code book attack: Attacking a block cipher by creating a code book, collecting plaintext/ciphertext pairs. [e]
  • Stub Birthday attack: An attack on a cryptographic system that works by finding two identical outputs from the system. [e]
  • Developing Article Meet-in-the-middle attack: An attack on a block cipher in which the attacker can calculate possible values of the same intermediate variable (the middle) in two independent ways, starting either from the input of the cipher (plaintext) or from the output ( ciphertext); he calculates some possible values each way and compares the results. [e]
  • Developing Article Man-in-the-middle attack: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
  • Stub Dictionary attack: Attacking a password system by encrypting an entire dictionary and then checking if any stored passwords match [e]
  • Stub Traffic analysis: Traffic analysis is a branch of signals intelligence, inferring useful information from messages without actually reading them. [e]


Many of these are only stubs.

  • Developed Article CAST (cipher): A general procedure for constructing a family of block ciphers. [e]
  • Stub Rivest ciphers: A set of symmetric-key encryption algorithms invented by Ron Rivest. [e]
  • Stub International Data Encryption Algorithm: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
  • Stub Serpent (cipher): A block cipher which was a finalist in the Advanced Encryption Standard (AES) contest, designed by Ross Anderson, Eli Biham, and Lars Knudsen. [e]
  • Developing Article Blowfish (cipher): A block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. [e]
  • Stub MARS (cipher): A block cipher that was IBM's submission to the Advanced Encryption Standard process. [e]
  • Developing Article Twofish (cipher): A bock cipher from Schneier and others that was a finalist in the AES competition. [e]
  • Stub GOST cipher: A Soviet and Russian government standard symmetric key block cipher; also based on this block cipher is the GOST hash function. [e]
  • Stub Skipjack (cipher): A block cipher developed by the U.S. National Security Agency (NSA); initially classified, it was originally intended for use in the controversial Clipper chip. [e]
  • Stub LOKI (cipher): Block ciphers (LOKI89 and LOKI91) designed as possible replacements for the Data Encryption Standard (DES). [e]
  • Stub SAFER (cipher): A family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation. [e]
  • Stub De-correlated Fast Cipher: A block cipher which was created in 1998 by a group of researchers from École Normale Supérieure, CNRS, and France Télécom, and submitted to the AES competition. [e]
  • Stub Tiny Encryption Algorithm: A block cipher notable for its simplicity of description and implementation (typically a few lines of code), designed by David Wheeler and Roger Needham. [e]
  • Stub Hasty Pudding (cipher): A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
  • Stub DEAL (cipher): A block cipher derived from the Data Encryption Standard (DES), from a design proposed in a report by Lars Knudsen in 1998. [e]
  • Stub E2 (cipher): A block cipher which was created in 1998 by NTT and submitted to the AES competition. [e]
  • Stub Camellia (cipher): A block cipher developed jointly by Mitsubishi and NTT in 2000, which has similar design elements to earlier block ciphers MISTY1 and E2. [e]
  • Stub CRYPTON (cipher): A block cipher efficient in hardware implementations, designed by Chae Hoon Lim of Future Systems Inc. [e]
  • Stub MAGENTA (cipher): A block cipher developed by Michael Jacobson Jr. and Klaus Huber for Deutsche Telekom. [e]
  • Stub SEED (cipher): A block cipher developed by the Korean Information Security Agency, used broadly throughout South Korean industry, but seldom found elsewhere. [e]
  • Stub FROG (cipher): A block cipher authored by Georgoudis, Leroux and Chaves, which can work with any block size between 8 and 128 bytes, and supports key sizes between 5 and 125 bytes. [e]
  • Stub Triple DES: The common name for the Triple Data Encryption Algorithm (TDEA) block cipher, named because it applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. [e]


Others I have contributed substantially to:

  • Developing Article Cryptography: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
  • Approved Article Cryptanalysis: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
  • Developing Article Random number generator: A member of a sequence of which the successive values cannot be predicted, produced by measurement of physical phenomena, appropriate algorithms, or a combination of the two [e]
  • Developing Article Politics of cryptography: Political and legal controversy over the use and export of cryptography [e]
  • Developing Article Data Encryption Standard: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
  • Stub Advanced Encryption Standard: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
  • Developed Article One-time pad: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
  • Developing Article IPsec: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
  • Developing Article Digital rights management: Legal and technical techniques used by media publishers in an attempt to control distribution and usage of distributed video, audio, ebooks, and similar electronic media. [e]
  • Developing Article Denial of service: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
  • Stub Botnet: A set of compromised computers which can collectively provide services to a "bot herder". [e]
  • Stub Steganography: The study of techniques for hiding a secret message within an apparently innocent message. [e]

I almost completely rewrote WikiLeaks after a complicated controversy over the article. Sandy Harris 13:15, 25 January 2011 (UTC)