Knowledge

Talk:Secure channel

Source 📝

497: 479: 249: 185: 161: 25: 130: 451: 395: 371: 507: 82: 307: 687:
I am working on a cryptographic text that covers something I think is missing both on Knowledge and in most crypto books. A text that briefly explains which steps one does in which order when encrypting a message (creating a secure channel). That is, make/exchange IVs, perhaps compress the message,
581:
Matt, Just noticed one of your edits. Indeed, betwixt is a nice word, but I use it for a specific reason, not because it's nice. I use it deliberately in the AE I perforce write as a levitous note. It's BE and sounds just slightly odd to the AE ear, and thus it provides some relief from the subject
667:
Gent: It was mine. It was an attempt at lightening the discussion, not a reference to RFC 1149, though I suppose it could be cited as an almost archaeological antecendent. It thought it a pleasant occasion for a smile. Sorry to see there are so many Botox'd folk around. ...
616:
Recently, a company called MagiQ has begun offering for sale what they call the first commercially available products to employ Quantum Key Exchange. Each key channel requires a dedicated optical fiber; the data may travel over any available network
739: 441: 338: 789: 553: 734: 769: 559: 759: 435: 784: 729: 774: 764: 724: 233: 529: 779: 754: 239: 714: 520: 484: 744: 719: 411: 272: 258: 171: 460: 381: 209: 619:" — I had a look at their website, and they do indeed tout themselves as "presenting the first commercial quantum cryptography solutions" 402: 376: 749: 693: 192: 166: 661: 639: 141: 692:
and I think that is a splendid idea. Since it is only a very rough draft I have put it under my user page for now:
347:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
599:
in order to create a secure channel. There is at least one commercial company offering a product embodying it.
512: 321: 129: 496: 478: 205: 604: 147: 115: 696:
I would love to get some help to brush it up to an acceptable level before I add it to the article. --
688:
MAC the message, encrypt the message etc. Matt Crypto suggested I should put it as a subsection under
611: 596: 29: 528:
on Knowledge. If you would like to participate, please visit the project page, where you can join
410:
on Knowledge. If you would like to participate, please visit the project page, where you can join
208:
on Knowledge. If you would like to participate, please visit the project page, where you can join
697: 525: 316: 94: 647: 623: 582:
under discussion. Perhaps it has a different effect to the BE ear? Please enlighten me.
689: 98: 33: 350:
Find editors who have shown interest in this subject and ask them to take a look here.
708: 407: 105:. For the contribution history and old versions of the redirected page, please see 248: 184: 160: 502: 201: 595:
Researchers have proposed, and actually demonstrated in real circumstances
450: 197: 700: 672: 669: 583: 394: 370: 657: 306: 123: 76: 15: 740:
Start-Class Computer Security articles of Unknown-importance
620: 449: 305: 247: 298: 293: 288: 283: 107: 89: 57: 51: 45: 39: 656:
Come to think of it, this morning I just remembered:
660:. Could that have been what it was referring to? -- 524:, a collaborative effort to improve the coverage of 406:, a collaborative effort to improve the coverage of 196:, a collaborative effort to improve the coverage of 558:This article has not yet received a rating on the 440:This article has not yet received a rating on the 328:Review importance and quality of existing articles 238:This article has not yet received a rating on the 331:Identify categories related to Computer Security 790:Unknown-importance Telecommunications articles 735:Unknown-importance Computer Security articles 8: 770:Unknown-importance Computer science articles 127: 114:; for the discussion at that location, see 473: 365: 337:Identify articles for creation (see also: 267: 155: 319:. Please allow some days for processing. 760:Unknown-importance Cryptography articles 538:Knowledge:WikiProject Telecommunications 785:Start-Class Telecommunications articles 541:Template:WikiProject Telecommunications 475: 367: 157: 730:Start-Class Computer Security articles 775:WikiProject Computer science articles 765:Start-Class Computer science articles 725:Unknown-importance Computing articles 7: 518:This article is within the scope of 400:This article is within the scope of 190:This article is within the scope of 108: 146:It is of interest to the following 420:Knowledge:WikiProject Cryptography 14: 780:WikiProject Cryptography articles 755:Start-Class Cryptography articles 423:Template:WikiProject Cryptography 344:Identify articles for improvement 715:Knowledge pages with to-do lists 505: 495: 477: 393: 369: 183: 159: 128: 80: 23: 694:User:Davidgothberg/Crypto_steps 646:Yeah, me too. I've removed it. 218:Knowledge:WikiProject Computing 745:All Computer Security articles 720:Start-Class Computing articles 521:WikiProject Telecommunications 221:Template:WikiProject Computing 1: 532:and see a list of open tasks. 458:This article is supported by 414:and see a list of open tasks. 315:will be generated shortly by 273:WikiProject Computer Security 259:WikiProject Computer Security 256:This article is supported by 212:and see a list of open tasks. 701:19:32, 9 November 2005 (UTC) 461:WikiProject Computer science 544:Telecommunications articles 806: 560:project's importance scale 240:project's importance scale 664:18:44, 21 Apr 2005 (UTC) 653:13:44, 21 Apr 2005 (UTC) 642:04:42, 21 Apr 2005 (UTC) 607:03:03, 16 Dec 2004 (UTC) 586:19:37, 20 Apr 2004 (UTC) 557: 490: 457: 439: 388: 266: 255: 237: 178: 154: 683:A secure channel example 662:I am not good at running 640:I am not good at running 629:07:32, 16 Dec 2004 (UTC) 513:Telecommunication portal 403:WikiProject Cryptography 673:20:44, 2 May 2005 (UTC) 750:All Computing articles 454: 310: 252: 206:information technology 136:This article is rated 453: 426:Cryptography articles 309: 251: 193:WikiProject Computing 87:The contents of the 612:Quantum cryptography 597:quantum cryptography 334:Tag related articles 271:Things you can help 109:Error: Invalid time. 322:More information... 535:Telecommunications 526:Telecommunications 485:Telecommunications 455: 311: 253: 224:Computing articles 142:content assessment 110: 63:Updated 2004-12-18 651: 627: 603:Which company? - 574: 573: 570: 569: 566: 565: 472: 471: 468: 467: 364: 363: 360: 359: 356: 355: 122: 121: 75: 74: 797: 649: 625: 546: 545: 542: 539: 536: 515: 510: 509: 508: 499: 492: 491: 481: 474: 442:importance scale 428: 427: 424: 421: 418: 397: 390: 389: 384: 382:Computer science 373: 366: 339:Article requests 324: 268: 226: 225: 222: 219: 216: 187: 180: 179: 174: 163: 156: 139: 133: 132: 124: 113: 104: 90:Insecure channel 84: 83: 77: 64: 27: 26: 16: 805: 804: 800: 799: 798: 796: 795: 794: 705: 704: 685: 636: 592: 579: 543: 540: 537: 534: 533: 511: 506: 504: 425: 422: 419: 416: 415: 379: 325: 320: 303: 223: 220: 217: 214: 213: 169: 140:on Knowledge's 137: 106: 102: 81: 71: 70: 38: 24: 12: 11: 5: 803: 801: 793: 792: 787: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 717: 707: 706: 698:David Göthberg 690:Secure channel 684: 681: 680: 679: 678: 677: 676: 675: 635: 632: 631: 630: 605:203.35.154.254 601: 600: 591: 588: 578: 575: 572: 571: 568: 567: 564: 563: 556: 550: 549: 547: 530:the discussion 517: 516: 500: 488: 487: 482: 470: 469: 466: 465: 456: 446: 445: 438: 432: 431: 429: 412:the discussion 398: 386: 385: 374: 362: 361: 358: 357: 354: 353: 352: 351: 348: 345: 342: 335: 332: 329: 313:Article alerts 304: 302: 301: 296: 291: 286: 280: 277: 276: 264: 263: 254: 244: 243: 236: 230: 229: 227: 210:the discussion 188: 176: 175: 164: 152: 151: 145: 134: 120: 119: 99:Secure channel 85: 73: 72: 66: 34:Secure channel 21: 19: 13: 10: 9: 6: 4: 3: 2: 802: 791: 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 716: 713: 712: 710: 703: 702: 699: 695: 691: 682: 674: 671: 666: 665: 663: 659: 655: 654: 652: 645: 644: 643: 641: 633: 628: 621: 618: 613: 610: 609: 608: 606: 598: 594: 593: 589: 587: 585: 576: 561: 555: 552: 551: 548: 531: 527: 523: 522: 514: 503: 501: 498: 494: 493: 489: 486: 483: 480: 476: 463: 462: 452: 448: 447: 443: 437: 434: 433: 430: 413: 409: 405: 404: 399: 396: 392: 391: 387: 383: 378: 375: 372: 368: 349: 346: 343: 340: 336: 333: 330: 327: 326: 323: 318: 314: 308: 300: 297: 295: 292: 290: 287: 285: 282: 281: 279: 278: 274: 270: 269: 265: 261: 260: 250: 246: 245: 241: 235: 232: 231: 228: 211: 207: 203: 199: 195: 194: 189: 186: 182: 181: 177: 173: 168: 165: 162: 158: 153: 149: 143: 135: 131: 126: 125: 117: 116:its talk page 112: 100: 96: 92: 91: 86: 79: 78: 69: 68:None listed. 65: 62: 59: 56: 53: 50: 47: 44: 41: 37: 35: 31: 20: 18: 17: 686: 637: 634:Pigeon chow? 615: 602: 580: 519: 459: 417:Cryptography 408:Cryptography 401: 377:Cryptography 312: 257: 191: 148:WikiProjects 88: 67: 60: 54: 48: 42: 28: 22: 617:connection. 138:Start-class 111:its history 709:Categories 103:2021-03-26 93:page were 30:To-do list 317:AAlertBot 215:Computing 202:computing 198:computers 167:Computing 590:Disputed 172:Security 658:RFC1149 648:— Matt 638:Huh? -- 624:— Matt 614:says, " 577:Betwixt 289:history 58:refresh 46:history 650:Crypto 626:Crypto 204:, and 144:scale. 95:merged 299:purge 294:watch 275:with: 97:into 52:watch 284:edit 40:edit 32:for 554:??? 436:??? 234:??? 101:on 711:: 670:ww 622:. 584:ww 380:: 200:, 170:: 562:. 464:. 444:. 341:) 262:. 242:. 150:: 118:. 61:· 55:· 49:· 43:· 36::

Index

To-do list
Secure channel
edit
history
watch
refresh
Insecure channel
merged
Secure channel
Error: Invalid time. its history
its talk page

content assessment
WikiProjects
WikiProject icon
Computing
Security
WikiProject icon
WikiProject Computing
computers
computing
information technology
the discussion
???
project's importance scale
Taskforce icon
WikiProject Computer Security
WikiProject Computer Security
edit
history

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.