Key-agreement Protocol - Shared Secret Keys

Shared Secret Keys

Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.

Read more about this topic:  Key-agreement Protocol

Famous quotes containing the words shared, secret and/or keys:

    Prose—it might be speculated—is discourse; poetry ellipsis. Prose is spoken aloud; poetry overheard. The one is presumably articulate and social, a shared language, the voice of “communication”; the other is private, allusive, teasing, sly, idiosyncratic as the spider’s delicate web, a kind of witchcraft unfathomable to ordinary minds.
    Joyce Carol Oates (b. 1938)

    Embraces are cominglings from the head even to the feet,
    And not a pompous high priest entering by a secret place.
    William Blake (1757–1827)

    without luggage or defenses,
    giving up my car keys and my cash,
    keeping only a pack of Salem cigarettes
    the way a child holds on to a toy.
    I signed myself in where a stranger
    puts the inked-in X’s
    Anne Sexton (1928–1974)