Cayley–Purser algorithm: Difference between revisions

Content deleted Content added
Jb1944 (talk | contribs)
Line 72:
 
This flaw does not preclude the algorithm's use as a mixed private-key/public-key algorithm, if the sender transmits <math>\epsilon</math> secretly, but this approach presents no advantage over the common approach of transmitting a [[symmetric encryption]] key using a public-key encryption scheme and then switching to symmetric encryption, which is faster than Cayley-Purser.
 
==See also==
[[Non-commutative cryptography]]
 
== References ==