Difference between revisions of "Key Exchange"
From MgmtWiki
								
												
				 (→References)  | 
				 (→References)  | 
				||
| Line 10: | Line 10: | ||
<references />  | <references />  | ||
===Other Material===  | ===Other Material===  | ||
| − | * See also [[Proof Key for Code Exchange]] for a similar   | + | * See also [[Proof Key for Code Exchange]] for a similar application.  | 
[[Category: Encryption]]  | [[Category: Encryption]]  | ||
[[Category: Trust]]  | [[Category: Trust]]  | ||
Revision as of 09:14, 31 May 2022
Full Title or Meme
Key Exchange protocols typical precede secure communications.
Context
- In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
 - With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
 - With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.
 
References
- ↑ Thomas C. Jones
 
Other Material
- See also Proof Key for Code Exchange for a similar application.