This is an old revision of this page, as edited by Primefac(talk | contribs) at 01:24, 22 October 2015(rmv template being deleted using AWB). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.Revision as of 01:24, 22 October 2015 by Primefac(talk | contribs)(rmv template being deleted using AWB)
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography
This article is within the scope of WikiProject Numismatics, a collaborative effort to improve the coverage of numismatics and currencies on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.NumismaticsWikipedia:WikiProject NumismaticsTemplate:WikiProject Numismaticsnumismatic
I would suggest this would be better named "Security protocol" than "Cryptographic protocol", as the latter is about ten times more common in a Google search. Any objections? — Matt Crypto 17:52, 24 Mar 2005 (UTC)
I suggest the following definition for a cryptographic protocol. A cryptographic protocol employs cryptographic methods and message passing to allow agreement on values by participants in the presence of an adversary. For example, an authentication protocol allows agreement on the identity of some participants, and a confidentiality protocol allows agreement on a shared secret. Ramsdell (talk) 02:09, 27 October 2008 (UTC)[reply]
It is the name used in the literature and publications because it is the field of modern cryptography in conjunction with distributed computing (O. Goldreich, �Cryptography and cryptographic protocols,� Distributed
Computing, vol. 16, no. 2-3, pp. 177�199, 2003.) Mohammad Al-Aggan (talk) 02:44, 9 January 2010 (UTC)[reply]