Shared Secret Keys
Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.
Read more about this topic: Key-agreement Protocol
Famous quotes containing the words shared, secret and/or keys:
“Proseit might be speculatedis discourse; poetry ellipsis. Prose is spoken aloud; poetry overheard. The one is presumably articulate and social, a shared language, the voice of communication; the other is private, allusive, teasing, sly, idiosyncratic as the spiders delicate web, a kind of witchcraft unfathomable to ordinary minds.”
—Joyce Carol Oates (b. 1938)
“Embraces are cominglings from the head even to the feet,
And not a pompous high priest entering by a secret place.”
—William Blake (17571827)
“without luggage or defenses,
giving up my car keys and my cash,
keeping only a pack of Salem cigarettes
the way a child holds on to a toy.
I signed myself in where a stranger
puts the inked-in Xs”
—Anne Sexton (19281974)