Talk:Hardware-based encryption

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Former good article nomineeHardware-based encryption was a Engineering and technology good articles nominee, but did not meet the good article criteria at the time. There may be suggestions below for improving the article. Once these issues have been addressed, the article can be renominated. Editors may also seek a reassessment of the decision if they believe there was a mistake.
Article milestones
DateProcessResult
June 5, 2018Good article nomineeNot listed
Did You Know
A fact from this article appeared on Wikipedia's Main Page in the "Did you know?" column on February 11, 2018.
The text of the entry was: Did you know ... that hardware-based encryption is probably in your computer?

GA Review[edit]

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


This review is transcluded from Talk:Hardware-based encryption/GA1. The edit link for this section can be used to add comments to the review.

Reviewer: Spinningspark (talk · contribs) 10:08, 20 May 2018 (UTC)[reply]


This is not going to be a full review because I think this article has a major problem with criterion 3a: "broad in its coverage". That puts it in immediate fail territory so I am going to limit my initial comments to that issue.

The lead says that "hardware-based encryption is the use of computer hardware to..." which establishes that computers are necessarily involved in encryption. This is not so, the article itself discusses the enigma machine, but dismisses it as not computer based. Logically, we could go back further to simple devices such as the diode coding matrix. I could also mention 1950s-60s style telephone scramblers, entirely hardware based.

I'm particularly concerned with the claim that ABYSS was the first hardware based encryption in 1987. Even if we accept that only computer-based encryption is being discussed, neither of the sources seem to state the fact (perhaps you could give an exact quote). Also, the use of "arguably" not only breaches WP:WTW but is an indication that editorialising is going on here.

This might be in a better place if the article had a different name, such as "Computer hardware based encryption". But as it stands, it needs a major rewrite and restructuring to be acceptable. SpinningSpark 10:08, 20 May 2018 (UTC)[reply]

I agree, DES was created in the 70's and was mainly implemented in hardware which is a decade before ABYSS. There were a number of military hardware systems in use before DES which was civilian, and with its short key length accessible by the NSA/GCHQ. Enigma style machines continued into the 70s. Today there are a lot of hardware systems for encyption/decryption, look at bitcoin mining for the rapid process in problem solving using hardware in this area. RonaldDuncan (talk) 15:29, 5 June 2018 (UTC)[reply]

Ok, I'm failing the article at this point. There has been zero response from the nominator, not even to acknowledge the review is happening. SpinningSpark 16:25, 5 June 2018 (UTC)[reply]
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.