Talk:Key (cryptography)

From Wikipedia, the free encyclopedia

WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography on Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.
WikiReader Cryptography It is intended that this article be included in WikiReader Cryptography, a WikiReader on the topic of cryptography. Help and comments for improving this article would be especially welcome. A tool for coordinating the editing and review of these articles is the daily article box.
To-do list for Key (cryptography):
  • Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.

[edit] Key article secrecy section vs. Secret_key redirect

The Secret key article redirects here. However, the subject of secrecy is dicussed here without really differentiating (well) the concept of secret keys (symmetric all secret) vs. public/private keys (asymmetric part secret). So perhaps the secret key article can be split out on its own (no more redirect), or it can be treated as a part of this article. Poppafuze 21:12, 21 October 2006 (UTC)

Opinions are solicited here:

  • No preference Poppafuze 21:12, 21 October 2006 (UTC)

[edit] List of applications

Hmm..not quite sure if this article is the right place for this...it's true that these protocols use keys, but I don't think it's sufficiently noteworthy for this topic. Perhaps we should move it to Cryptographic protocol ? — Matt 15:45, 12 Oct 2004 (UTC)

I agree. This part should probably contain a simple link to Cryptographic protocol, especially since it seems it was created in the first place to advertise PGP :) ClementSeveillac 16:20, 12 Oct 2004 (UTC)

[edit] Major Edit

I've attempted a major cleanup and dropped some redundant text. I shortend the discussion of key length and pointed readers to the full article. I am also deleting "If a key can be guessed, an attacker is likely to be able to break the entire cryptosystem. For example, the poor choice of using related keys for the Japanese PURPLE cipher machine during World War II made it much easier for American analysts to continue to break encoded traffic after their initial breakthrough." It really does not affect modern systems much, particularly given the assumption that "the system is known". More work neded, but ran out of time for now. --agr 15:40, 19 Nov 2004 (UTC)

Thanks, I've also hacked on the lead section a little, and I think the article is looking quite a lot better than it did on the 15th. But yes, still more to do, I think. — Matt 06:40, 22 Nov 2004 (UTC)