![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||
|
Jmabel 01:56, Sep 26, 2004 (UTC)
Need to write out the mathematics of the algorithm.
Added by anon; could somebody verify this?
The Cayley-Purser algorithm is famous, because it was orginally announced that is was a Public-key but it is really a Private-key(one-key,Symmetric key algorithm) cryptosystem, because too much information is leaked in the Cayley-Purser algorithm. -Sarah Flannery, "In Code" It can not securly function as a public and private key cryptosystem.
![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||
|
Jmabel 01:56, Sep 26, 2004 (UTC)
Need to write out the mathematics of the algorithm.
Added by anon; could somebody verify this?
The Cayley-Purser algorithm is famous, because it was orginally announced that is was a Public-key but it is really a Private-key(one-key,Symmetric key algorithm) cryptosystem, because too much information is leaked in the Cayley-Purser algorithm. -Sarah Flannery, "In Code" It can not securly function as a public and private key cryptosystem.