Talk:Yahalom (protocol)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

expert attention[edit]

I don't see how this page differs from other authentication protocols (Needham-Schroeder protocol, Otway-Rees protocol, Neuman-Stubblebine protocol, etc). So should we include expert opinion on all of those pages as well. The same can be said about intricate information template. --Chrismiceli (talk) 04:23, 8 October 2009 (UTC)[reply]

I'm the editor who added the {{expert}} template. I added it because the article jumps right into the details of the encryption algorithm without any preamble. Maybe {{expert}} was inappropriate, but this article does not even make it clear whether Yahalom is a symmetric cipher, a trapdoor, a block or stream cipher, etc. I am not a cryppie, but I am a techie, and found this article not to tell me much about Yahalom that I could understand beyond "Yahalom is an encryption algorithm", which seems too bad. Tim Pierce (talk) 11:53, 8 October 2009 (UTC)[reply]
Does Kerberos (protocol) provide a better introduction, notably the first sentence? They are essentially the same thing. We need to resolve this issue so all authentication protocols are accessible to readers. --Chrismiceli (talk) 07:00, 9 October 2009 (UTC)[reply]
  • (As an expert), may be i should point that Kerberos is much more improved protocol than Yahalom. This protocol doesn't introduce tickets, also doesn't protect Alice and Bob against replay-attack (but Needham-Schroeder does, as well as Kerberos). All such protocols do the same - share some secret session key between Alice and Bob. But all those protocols doing it in different ways, where Wide-mouth frog is the simplest (and the least protected) and Kerberos - one of the strongest. Hope this can help to clarify. Also... read sources, Schneier is very good one :) Vlsergey (talk) 04:26, 2 August 2010 (UTC)[reply]