Talk:Key (cryptography)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Cryptography / Computer science  (Rated Start-class)
WikiProject icon This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the quality scale.
 ???  This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.
 
edit·history·watch·refresh Stock post message.svg To-do list for Key (cryptography):
  • Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.

Key article secrecy section vs. Secret_key redirect[edit]

The Secret key article redirects here. However, the subject of secrecy is dicussed here without really differentiating (well) the concept of secret keys (symmetric all secret) vs. public/private keys (asymmetric part secret). So perhaps the secret key article can be split out on its own (no more redirect), or it can be treated as a part of this article. Poppafuze 21:12, 21 October 2006 (UTC)

Opinions are solicited here:

  • No preference Poppafuze 21:12, 21 October 2006 (UTC)

List of applications[edit]

Hmm..not quite sure if this article is the right place for this...it's true that these protocols use keys, but I don't think it's sufficiently noteworthy for this topic. Perhaps we should move it to Cryptographic protocol ? — Matt 15:45, 12 Oct 2004 (UTC)

I agree. This part should probably contain a simple link to Cryptographic protocol, especially since it seems it was created in the first place to advertise PGP :) ClementSeveillac 16:20, 12 Oct 2004 (UTC)

Major Edit[edit]

I've attempted a major cleanup and dropped some redundant text. I shortend the discussion of key length and pointed readers to the full article. I am also deleting "If a key can be guessed, an attacker is likely to be able to break the entire cryptosystem. For example, the poor choice of using related keys for the Japanese PURPLE cipher machine during World War II made it much easier for American analysts to continue to break encoded traffic after their initial breakthrough." It really does not affect modern systems much, particularly given the assumption that "the system is known". More work neded, but ran out of time for now. --agr 15:40, 19 Nov 2004 (UTC)

Thanks, I've also hacked on the lead section a little, and I think the article is looking quite a lot better than it did on the 15th. But yes, still more to do, I think. — Matt 06:40, 22 Nov 2004 (UTC)