Jump to content

Wikipedia:Articles for deletion/Anti-Statistical Block Encryption

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Duffbeerforme (talk | contribs) at 14:24, 1 October 2012 (an attempt to clean this up). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Anti-Statistical Block Encryption (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

== Summary of Reasons for Deletion ==

Article does not source the major claims made, including many exceptional claims identified by use of phrases like "designed to defeat", "not subject to attack models and methods of Cryptanalysis", "cannot be used against the algorithm", and others.

Article uses several sources written by the author of the algorithm, without 3rd party sources that specifically have mention of the Anti-Statistical Block Encryption (ASBE) algorithm. Other sources include press releases by ASBE author's company, whitepapers hosted on ASBE author's personal or company website.

Many references are attached to claims in article, but analysis of references show that claims are not supported.

StickyWidget (talk) 22:58, 28 September 2012 (UTC)[reply]


== Copied From Talk Page==

Having difficulty finding 3rd party sources on ASBE algorithm in cryptography literature WP:SOURCES.

Doesn't meet internet search test WP:GOOGLETEST for 3rd party sources. Searches for "ASBE algorithm", "Anti-Statistical Block Encryption" only return articles by algorithm author, author's company, or press releases WP:SELFPUBLISH.

Some article sources were informative, but did not validate the claims in the article they were associated with, and were removed.

Statements in "Cryptographic Contributions" section are wholly unsourced once references were reviewed, and appear exceptional WP:REDFLAG.

Examples

  1. SysAdmin, Audit, Network, Security Institute White Paper - Doesn't discuss how the ASBE "is not subject to attack models and methods of Cryptanalysis" as stated in WP article
  1. Department of the Arny Field Manual - Poorly cited, cannot find reference to ASBE or how it "is not subject to attack models and methods of Cryptanalysis" as stated in WP article
  2. Tech Target Definitions Types of Cryptanalysis defined - Informative, but doesn't discuss how ASBE "is not subject to attack models and methods of Cryptanalysis" as stated in WP article
  3. BIS/NSA ECCN 5D992.c Mass Market encryption with large key lengths - Informative, but doesn't provide evidence that the ASBE was evaluated as stated in WP article
  4. Prem Sobel Background Research New Statistical Algorithm and Work Leading to ASBE Algorithm - Doesn't validate statement that ASBE was " first encryption to use variable encryption keys that scale in size from 2008 bits up to 2 GB". Also, link is to website that appears to be self published by author of algorithm (Prem Sobel), and is not a 3rd party source
  5. Prem Sobel White Paper ASBE Defeats Statistical Analysis and Other Cryptanalysi - Doesn't validate statement that ASBE was "first encryption to use variable encryption keys that scale in size from 2008 bits up to 2 GB". Additionally, whitepaper is written by author of ASBE algorithm (Prem Sobel), and is not a 3rd party source.
StickyWidget (talk) 22:58, 28 September 2012 (UTC)[reply]