Talk:Cayley–Purser algorithm
Page contents not supported in other languages.
Appearance
From Wikipedia, the free encyclopedia
This article is rated Start-class on Wikipedia's content assessment scale.
It is of interest to the following WikiProjects:
It is of interest to the following WikiProjects:
WikiProject icon This article is within the scope of WikiProject Cryptography , a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography
Low This article has been rated as Low-importance on the importance scale.
Translation
[edit ]- Article: de:Cayley-Purser-Algorithmus
- Corresponding English-language article: Cayley-Purser algorithm
- Originally Requested by: — Matt 18:12, 27 Jul 2004 (UTC)
- Status: Done by User:Mpolo
- Other notes:
Jmabel 01:56, Sep 26, 2004 (UTC)
Need to write out the mathematics of the algorithm.
Added by anon; could somebody verify this?
The Cayley-Purser algorithm is famous, because it was orginally announced that is was a Public-key but it is really a Private-key(one-key,Symmetric key algorithm) cryptosystem, because too much information is leaked in the Cayley-Purser algorithm. -Sarah Flannery, "In Code" It can not securly function as a public and private key cryptosystem.