Difference between revisions of "Key Exchange"
From MgmtWiki
(→References) |
(→References) |
||
Line 7: | Line 7: | ||
* With the advent of [[Public Key Infrastructure]] provably security [[Key Exchange]] is possible and in 2021 had been demonstrated. | * With the advent of [[Public Key Infrastructure]] provably security [[Key Exchange]] is possible and in 2021 had been demonstrated. | ||
+ | ==Solutions== | ||
+ | * [https://x25519.ulfheim.net/ Hands-on: X25519 Key Exchange] using [[Elliptic Key]] technology. | ||
+ | |||
==References== | ==References== | ||
<references /> | <references /> |
Revision as of 09:26, 31 May 2022
Full Title or Meme
Key Exchange protocols typical precede secure communications.
Context
- In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
- With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
- With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.
Solutions
- Hands-on: X25519 Key Exchange using Elliptic Key technology.
References
- ↑ Thomas C. Jones
Other Material
- See also Proof Key for Code Exchange for a similar application.