Talk:Symmetric-key algorithm
Re: Statement "The symmetric-key algorithms can't be used for authentication or non-repudiation purposes." Isn't authentication possible, using a KDC?
Re: authentication is possible, but you need a trusted channel first.. which involves asymmetric cryto... Sounds weird anyway.
Quite a few sections of this document are written in broken or poor English. Someone needs to fix this! —Preceding unsigned comment added by 130.102.71.38 (talk) 04:18, 5 September 2007 (UTC)
Word usage
In your section marked "speed" I find the following sentence:
"In practice, this means that a quality asymmetric key algorithm is hundreds or thousands of times slower than a quality symmetric key algorithm."
The word "quality" unmodified has no meaning in this sentence. It is like saying "the plane was flying at an altitude." If it is off the ground, it has altitude, but, unmodified, gives no information on how far off the ground. High altitude? Low altitude? I believe you are trying to say "high quality." If this is so, may I suggest saying so? Kjdamrau 06:42, 7 July 2007 (UTC)Ken Damrau
Content yet lacking depth
Seems as much on asymmetric as on symmetric encryption.
Why not move description of other concepts to the respective article or - if comparing - to a higher level, eg to an article on crypto systems in general.
And, sorry to say this, substance is yet lacking.
Whoever has a few serious math books at hand and an understanding of the taxonomy ... thanks. 14 Sep 2007 —Preceding unsigned comment added by 84.58.17.179 (talk) 20:17, 15 September 2007 (UTC)