Difference between revisions of "Key Exchange"
From MgmtWiki
(→Context) |
(→References) |
||
Line 8: | Line 8: | ||
==References== | ==References== | ||
+ | <references /> | ||
+ | ===Other Material=== | ||
* See also [[Proof Key for Code Exchange]] for a similar applications. | * See also [[Proof Key for Code Exchange]] for a similar applications. | ||
[[Category: Encryption]] | [[Category: Encryption]] | ||
[[Category: Trust]] | [[Category: Trust]] |
Revision as of 10:14, 31 May 2022
Full Title or Meme
Key Exchange protocols typical precede secure communications.
Context
- In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
- With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
- With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.
References
- ↑ Thomas C. Jones
Other Material
- See also Proof Key for Code Exchange for a similar applications.