Talk:Cryptographic key: Difference between revisions
Jump to navigation
Jump to search
imported>Andrey Khalyavin |
imported>Mario Strefler (TODO) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
==TODO== | |||
The session key part needs clarification on when keys are transported securely, with symmetric or asymmetric techniques or exchanged as in DH. [[User:Mario Strefler|Mario Strefler]] 20:20, 30 November 2008 (UTC) | |||
== Key-specific as opposed to cryptosystem == | == Key-specific as opposed to cryptosystem == |
Revision as of 15:20, 30 November 2008
TODO
The session key part needs clarification on when keys are transported securely, with symmetric or asymmetric techniques or exchanged as in DH. Mario Strefler 20:20, 30 November 2008 (UTC)
Key-specific as opposed to cryptosystem
Thanks for catching the errors in cryptographic key. I'm not sure, however, that the comment on stream ciphers belongs in an article specifically about keys, unless there were a discussion of stream keying (and perhaps autokey) in its own section.
We may need a survey article, however, about modern cryptosystems in general, and techniques like stream, block, etc., ciphers, as well as OTP, algorithmic approaches such as Feistel, etc., might be better there. What do you think (note copied on user talk page) Howard C. Berkowitz 11:57, 31 July 2008 (CDT)
- Yeah, the comment better to belong to the article about ciphers than keys. Andrey Khalyavin 05:42, 1 August 2008 (CDT)
Categories:
- Article with Definition
- Developed Articles
- Advanced Articles
- Nonstub Articles
- Internal Articles
- Mathematics Developed Articles
- Mathematics Advanced Articles
- Mathematics Nonstub Articles
- Mathematics Internal Articles
- Computers Developed Articles
- Computers Advanced Articles
- Computers Nonstub Articles
- Computers Internal Articles
- Military Developed Articles
- Military Advanced Articles
- Military Nonstub Articles
- Military Internal Articles
- Military tag
- Security tag