# GPT Prompts Create a concise and informative UncloakWiki article about [Topic]. - Respond with a markdown-formatted code block for easy copy-pasting into a markdown editor. - Output all content in code blocks - Focus on cryptography engineering aspects - Craft a short description (max 180 characters) to showcase the article - Include an overview, mermaid diagrams where relevant, relevance in the field, applications, history, and future directions - Include a title and an explanation for any technical diagrams. - Craft engaging and descriptive section titles that deviate from the provided categories - Structure the content with a logical flow and clear organization - Keep the content brief and the writing style technical and professional. - Write objectively and use up-to-date, authoritative sources. PROMPT Please create individual YAML frontmatter, Related Pages, and External Resources sections for each of the following topics for a wiki.js based UncloakWiki. The topics are: [topic 1] [topic 2] Make sure to provide the information in a markdown-formatted code block. If you include any mermaid diagrams, please separate them with their own code block and continue the markdown-formatted text in a new code block afterwards. Here is an example: ```markdown --- title: Confidentiality description: Confidentiality is a principle of information security that ensures data is accessible only to authorized parties and protected from unauthorized disclosure. published: true date: 2023-03-29T18:30:00.000Z tags: confidentiality, information-security, cybersecurity editor: markdown dateCreated: 2023-03-29T18:30:00.000Z --- ## Related Pages - primary-topic:: [Information Security](https://wiki.uncloak.org/topic/Information-Security) - context:: [Integrity](https://wiki.uncloak.org/topic/Integrity) - context:: [Availability](https://wiki.uncloak.org/topic/Availability) ## External Resources - Wikipedia:: [Information Security](https://en.wikipedia.org/wiki/Information_security) ``` Topics: ## Eggs for party ```bash #!/bin/bash from_index=0 limit=600 for ((i=$from_index; i<$limit; i++)) do # Get the metadata and data for the frame range response=$(near view pixelparty.near load_frames '{"start":'$i', "end":'$((i+1))'}') # Print the response echo "Response for frames $i:" echo "$response" # Extract JSON content from the response response_json=$(echo "$response" | grep -oP '{.*}') # Extract the owner for the current frame owner=$(echo "$response_json" | jq -r '.metadata[0].owner') # Print the owner echo "Owner of frame $i: $owner" # If the owner is not null, send a lootbox if [ "$owner" != "null" ]; then near call pixeltoken.near ch_add_presale_box '{"account_id":"'$owner'", "rarity_type": 2}' --account_id=pixeltoken.near fi done ``` I am hoping to write a blog post about Block Ciphers for The Uncloak Cryptography wiki. Here is my outline: The intended audience is technical developers and researchers, can you please rewrite this for brevity and to ensure there are lots of examples to others areas that readers can research in their own time. Please generate the post as a markdown text file that can be copied and use the appropriate markdown syntax where a link to an external resource might be placed as we go back and edit the post. # GPT 3.5 prompt I am hoping to write a blog post about: [Topic of post] for The Uncloak Cryptography wiki. Here is an example post: # Block Ciphers Block ciphers are crucial in modern cryptography, encrypting data securely with a secret key for various applications like [SSL/TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security), disk encryption, and secure messaging apps. They work by dividing data into fixed-length blocks and encrypting each block using the key. Despite being efficient, they can be vulnerable to certain attacks. ## How Block Ciphers Work Block ciphers are symmetric encryption algorithms that encrypt fixed-length plaintext blocks into ciphertext using a secret key. They apply mathematical operations like substitution and permutation to each block. Block size determines the number of bits in each plaintext block, affecting security and speed. ## Modes of Operation Block ciphers operate in various modes, including Electronic Codebook (ECB), Cipher Block Chaining (CBC), and Counter (CTR). Each has its own tradeoffs regarding security, speed, and complexity. ECB is simple and efficient, but vulnerable to pattern-based attacks. CBC uses feedback mechanisms, enhancing resistance to attacks but increasing complexity. CTR uses counters to create unique key streams for each plaintext block but is susceptible to attacks exploiting counter predictability. ## Strengths and Weaknesses Block ciphers are fast and efficient but can be vulnerable to side-channel attacks, birthday attacks, and other exploits. Countermeasures like randomizing input data or masking and shuffling can help mitigate these vulnerabilities. ## Popular Block Ciphers - AES (Advanced Encryption Standard): Widely used, supports 128, 192, or 256-bit key sizes. - Blowfish: Designed by Bruce Schneier, uses variable-length keys and supports block sizes up to 448 bits. - DES (Data Encryption Standard): One of the first widely used block ciphers, now considered insecure. ## Attacks and Countermeasures Block ciphers can be attacked through brute-force, differential cryptanalysis, and linear cryptanalysis. Countermeasures include increasing key size, changing the mode of operation, or adding extra rounds to the encryption process. Techniques like key whitening, masking, and shuffling can also improve security. ## Future of Block Ciphers As computing power advances, block ciphers may face new threats like quantum computing attacks. Ongoing research focuses on lightweight cryptography, quantum-resistant algorithms, and physical implementation security to address these challenges. For further research, explore the [NIST lightweight cryptography competition](https://csrc.nist.gov/Projects/Lightweight-Cryptography) and ongoing developments in cryptography resistant to side-channel attacks. ___ The intended audience is technical developers and researchers, can you please rewrite this for brevity and to ensure there are lots of examples to others areas that readers can research in their own time. What might be an appropriate outline for my short and technical post? Please generate the post as a markdown text file that can be copied and use the appropriate markdown syntax where a link to an external resource might be placed as we go back and edit the post.