Template:Did you know nominations/Hardware-based encryption
Appearance
- The following is an archived discussion of the DYK nomination of the article below. Please do not modify this page. Subsequent comments should be made on the appropriate discussion page (such as this nomination's talk page, the article's talk page or Wikipedia talk:Did you know), unless there is consensus to re-open the discussion at this page. No further edits should be made to this page.
The result was: promoted by Cwmhiraeth (talk) 07:21, 6 February 2018 (UTC)
DYK toolbox |
---|
Hardware-based encryption
[edit]- ... that hardware-based encryption is probably in your computer?"Intel ARK". Retrieved 24 January 2018.
... that hardware-based encryption is when computer hardware is used to assist software, or sometimes replace software, in the process of data encryption?
Created by Bellezzasolo (talk). Self-nominated at 17:36, 20 January 2018 (UTC).
- Article is new enough, long enough, and mostly well referenced. QPQ is not required for new DYK nominator. However, the hook is dull. It explains what the subject is, which is largely self-explanatory. Please propose a different hook. And a few sections lack adequate sourcing, including the "x86" section and the sentence about IBM 4758 processor. The IBM 4764 description refers to IBM 4765, but does not explain what that is. -Zanhe (talk) 03:50, 24 January 2018 (UTC)
- @Zanhe: I've added a few more sources, particularly to the x86 section, and I've got sources for the IBM family. I've also added an alternative hook which is probably better! ∰Bellezzasolo✡ Discuss 13:32, 24 January 2018 (UTC)
- @Zanhe: OK, I've got
Its design goal is to achieve high throughput on virtually all modern 64-bit processors, that nowadays already have native instructions for AES. ... This would capture any recent 64-bit PC, tablet, desktop, or even smartphone.
— Shay Gueron (University of Haifa & Intel) and Nicky Mouha (KU Leuven & NIST), "Simpira v2: A Family of Efficient Permutations Using the AES Round Function" (PDF). 9 November 2016.
- @Zanhe: OK, I've got
- @Zanhe: Done, I've added a subsection to Implementation about proliferation. ∰Bellezzasolo✡ Discuss 12:14, 25 January 2018 (UTC)
- I'm satisfied with the sourcing of the current hook, which is far more interesting than the original. All my concerns have been addressed. The article has no copyvio issues. The image is freely licensed (although it should be transferred to the Commons). Thanks for the nice article! It's good to go. -Zanhe (talk) 19:40, 25 January 2018 (UTC)