Difference between revisions of "Key Exchange"
From MgmtWiki
(Created page with "==Full Title or Meme== Key Exchange protocols typical precede secure communications. ==Context== * In the 1970's and onward, key exchange was typically a mechanical proce...") |
(→Context) |
||
Line 3: | Line 3: | ||
==Context== | ==Context== | ||
− | * In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel. | + | * In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.<ref>Thomas C. Jones</ref> |
− | * | + | * With the advent of [[Public Key Cryptography]], various [[Key Exchange]] protocols have been developed that use some sort of [[Public Key Infrastructure]] to initiate a secure communication channel. |
+ | * With the advent of [[Public Key Infrastructure]] provably security [[Key Exchange]] is possible and in 2021 had been demonstrated. | ||
==References== | ==References== |
Revision as of 10:12, 31 May 2022
Full Title or Meme
Key Exchange protocols typical precede secure communications.
Context
- In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
- With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
- With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.
References
- See also Proof Key for Code Exchange for a similar applications.