Talk:Yahalom (protocol)

expert attention
I don't see how this page differs from other authentication protocols (Needham-Schroeder protocol, Otway-Rees protocol, Neuman-Stubblebine protocol, etc). So should we include expert opinion on all of those pages as well. The same can be said about intricate information template. --Chrismiceli (talk) 04:23, 8 October 2009 (UTC)


 * I'm the editor who added the expert template. I added it because the article jumps right into the details of the encryption algorithm without any preamble.  Maybe expert was inappropriate, but this article does not even make it clear whether Yahalom is a symmetric cipher, a trapdoor, a block or stream cipher, etc.  I am not a cryppie, but I am a techie, and found this article not to tell me much about Yahalom that I could understand beyond "Yahalom is an encryption algorithm", which seems too bad. Tim Pierce (talk) 11:53, 8 October 2009 (UTC)


 * Does Kerberos (protocol) provide a better introduction, notably the first sentence? They are essentially the same thing. We need to resolve this issue so all authentication protocols are accessible to readers. --Chrismiceli (talk) 07:00, 9 October 2009 (UTC)


 * (As an expert), may be i should point that Kerberos is much more improved protocol than Yahalom. This protocol doesn't introduce tickets, also doesn't protect Alice and Bob against replay-attack (but Needham-Schroeder does, as well as Kerberos). All such protocols do the same - share some secret session key between Alice and Bob. But all those protocols doing it in different ways, where Wide-mouth frog is the simplest (and the least protected) and Kerberos - one of the strongest. Hope this can help to clarify. Also... read sources, Schneier is very good one :) Vlsergey (talk) 04:26, 2 August 2010 (UTC)