Jump to content

Talk:Symmetric-key algorithm

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 37.209.180.8 (talk) at 14:17, 11 June 2014. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconCryptography: Computer science Start‑class Top‑importance
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
TopThis article has been rated as Top-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as High-importance).

Re: Statement "The symmetric-key algorithms can't be used for authentication or non-repudiation purposes." Isn't authentication possible, using a KDC?

Re: authentication is possible, but you need a trusted channel first.. which involves asymmetric cryto... Sounds weird anyway.

Quite a few sections of this document are written in broken or poor English. Someone needs to fix this! —Preceding unsigned comment added by 130.102.71.38 (talk) 04:18, 5 September 2007 (UTC)[reply]

Word usage

In your section marked "speed" I find the following sentence:

"In practice, this means that a quality asymmetric key algorithm is hundreds or thousands of times slower than a quality symmetric key algorithm."

The word "quality" unmodified has no meaning in this sentence. It is like saying "the plane was flying at an altitude." If it is off the ground, it has altitude, but, unmodified, gives no information on how far off the ground. High altitude? Low altitude? I believe you are trying to say "high quality." If this is so, may I suggest saying so? Kjdamrau 06:42, 7 July 2007 (UTC)Ken Damrau[reply]

Content yet lacking depth

Seems as much on asymmetric as on symmetric encryption.

Why not move description of other concepts to the respective article or - if comparing - to a higher level, eg to an article on crypto systems in general.

And, sorry to say this, substance is yet lacking.

Whoever has a few serious math books at hand and an understanding of the taxonomy ... thanks. 14 Sep 2007 —Preceding unsigned comment added by 84.58.17.179 (talk) 20:17, 15 September 2007 (UTC)[reply]

On the proposed merger with symmetric key management

Oppose merger Key management is a very large, hard to adequately cover, easy to get wrong (both in execution and in description), topic. It simply can't be adequately handled as a sub section of this article, and to try will result in lowered quality of this article, which already needs improvement. So, for both content and for reasons of WP presentation of that content, this merger is not a good idea. ww (talk) 07:06, 10 March 2009 (UTC)[reply]

Oppose merger This page is basically an overview over different topics on symmetric key algorithms. To keep this overview readable it is a good idea to keep the details on each of these topics in separate articles. 62.203.28.106 (talk) 10:03, 10 March 2009 (UTC)[reply]

Trivially Related? Wording?

Is the phrase a term of art or a conventional term? If not, it seems to me it should be changed to "closely related". Trivialy related would seem to me to suggest the relationship exists but it is small or insignificant, trivial. This seems exactly opposite to what the reality is- the relationship is identical or the keys differ by a small relatively insignificant transformation, a trivial difference.

Thoughts? --Δζ (talk) 02:32, 9 March 2010 (UTC)[reply]

The term "trivial" is used in mathematics to express that something is easy (see Trivial_(mathematics)).85.3.72.132 (talk) 07:11, 9 March 2010 (UTC)[reply]
It should be removed. If the twp keys aren't identical it isn't symmetric. If they are different they are asymmetric. If the difference is trivial, then it may just be a poorly chosen key pair.

Kernel.package (talk) 00:02, 25 May 2011 (UTC)[reply]

Introduction weak

The first two sentences could easily be merged/joined, as they convey similar information.

Possible conflict of interest issue

The line, "It is possible to encrypt without using any fixed algorithm. Non-Algorithmic Encryption[5]" contains a link to a page which offers products for sale. The phrase "Non-Algorithmic Encryption" seems to me to be a contradiction in terms and may possibly be a trademark belonging to a Swedish company called TRNG98. JLKrause (talk) 03:41, 26 July 2013 (UTC)[reply]

Moreover, there is a lack of secondary sources WP:OR. Typically, encryption schemes on Wikipedia should have been published (i.e. peer reviewed) and analyzed. 05:42, 26 July 2013 (UTC) — Preceding unsigned comment added by 2A02:1205:C6BB:6880:A0CE:5BE0:C90E:6766 (talk)

removed "well-respected" from "Implementations"

RC4 is mentioned and is not "well-respected" nowadays! has been known to be insecure for _years_. source: ivan ristic, bulletproof SSL, feistyduck.com. from a historic point of view RC4 deserves respect for sure - but any statement to that regard would have to be specific enough not to lead readers to think RC4 is still considered secure as of today.