Jump to content

Talk:Cryptographic protocol

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 203.88.149.10 (talk) at 09:37, 25 February 2010. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
WikiProject iconCryptography: Computer science Unassessed
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.

Template:CryptographyReader

Name

I would suggest this would add the tejas be better named "Security protocol" than "Cryptographic protocol", as the latter is about ten times more common in a Google search. Any objections? — Matt Crypto 17:52, 24 Mar 2005 (UTC)

Both works fine for me. Although for me "Security protocol" has a wider meaning and might include soft human issues etc. --David Göthberg 21:18, 2 November 2005 (UTC)[reply]

I suggest the following definition for a cryptographic protocol. A cryptographic protocol employs cryptographic methods and message passing to allow agreement on values by participants in the presence of an adversary. For example, an authentication protocol allows agreement on the identity of some participants, and a confidentiality protocol allows agreement on a shared secret. Ramsdell (talk) 02:09, 27 October 2008 (UTC)[reply]

It is the name used in the literature and publications because it is the field of modern cryptography in conjunction with distributed computing (O. Goldreich, �Cryptography and cryptographic protocols,� Distributed Computing, vol. 16, no. 2-3, pp. 177�199, 2003.) Mohammad Al-Aggan (talk) 02:44, 9 January 2010 (UTC)[reply]