22:3522:35, 19 April 2022diffhist−1
Public-key cryptography
In the box on signature, change "encrypting" to "processing" its hash value because practically no signature scheme in actual use is correctly described by encryption of a hash, and in public-key encryption the role of the private key is decryption, not encryption.
22:2022:20, 19 April 2022diffhist+4
Public-key cryptography
→Description: Add "can" before "also ensures that the message has not been tampered with", because this requires the "non-colliding signatures" property, which is non-standard, and e.g. not a characteristic of short Schnorr signature
14:1614:16, 29 October 2021diffhist+761
Chaotic cryptology
→Types: Put the chronologically first and quantitatively dominant symmetric kind first. Add a source of the dichotomy. Mention that the asymmetric chaos cryptography cryptosystems cited are broken.
22:3522:35, 19 April 2022diffhist−1
Public-key cryptography
In the box on signature, change "encrypting" to "processing" its hash value because practically no signature scheme in actual use is correctly described by encryption of a hash, and in public-key encryption the role of the private key is decryption, not encryption.
22:2022:20, 19 April 2022diffhist+4
Public-key cryptography
→Description: Add "can" before "also ensures that the message has not been tampered with", because this requires the "non-colliding signatures" property, which is non-standard, and e.g. not a characteristic of short Schnorr signature
14:1614:16, 29 October 2021diffhist+761
Chaotic cryptology
→Types: Put the chronologically first and quantitatively dominant symmetric kind first. Add a source of the dichotomy. Mention that the asymmetric chaos cryptography cryptosystems cited are broken.