Difference between revisions of "Key Exchange"

From MgmtWiki
Jump to: navigation, search
(References)
(References)
Line 10: Line 10:
 
<references />
 
<references />
 
===Other Material===
 
===Other Material===
* See also [[Proof Key for Code Exchange]] for a similar applications.
+
* See also [[Proof Key for Code Exchange]] for a similar application.
  
 
[[Category: Encryption]]
 
[[Category: Encryption]]
 
[[Category: Trust]]
 
[[Category: Trust]]

Revision as of 10:14, 31 May 2022

Full Title or Meme

Key Exchange protocols typical precede secure communications.

Context

  • In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
  • With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
  • With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.

References

  1. Thomas C. Jones

Other Material