Difference between revisions of "Key Exchange"

From MgmtWiki
Jump to: navigation, search
(References)
(References)
 
Line 15: Line 15:
 
* See also [[Proof Key for Code Exchange]] for a similar application.
 
* See also [[Proof Key for Code Exchange]] for a similar application.
  
[[Category: Encryption]]
+
[[Category: Cryptography]]
 
[[Category: Trust]]
 
[[Category: Trust]]

Latest revision as of 09:28, 31 May 2022

Full Title or Meme

Key Exchange protocols typical precede secure communications.

Context

  • In the 1970's and onward, key exchange was typically a mechanical process were encryption or signing keys were distributed by physically embedding the key in a piece of hardware that was then put into tamper-evident packaging an physically moved to both ends of the secure communications channel.[1]
  • With the advent of Public Key Cryptography, various Key Exchange protocols have been developed that use some sort of Public Key Infrastructure to initiate a secure communication channel.
  • With the advent of Public Key Infrastructure provably security Key Exchange is possible and in 2021 had been demonstrated.

Solutions

References

  1. Thomas C. Jones

Other Material