Key-agreement Protocol - Shared Secret Keys

Shared Secret Keys

Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.

Read more about this topic:  Key-agreement Protocol

Famous quotes containing the words shared, secret and/or keys:

    Prose—it might be speculated—is discourse; poetry ellipsis. Prose is spoken aloud; poetry overheard. The one is presumably articulate and social, a shared language, the voice of “communication”; the other is private, allusive, teasing, sly, idiosyncratic as the spider’s delicate web, a kind of witchcraft unfathomable to ordinary minds.
    Joyce Carol Oates (b. 1938)

    Everything human is pathetic. The secret source of Humor itself is not joy but sorrow. There is no humor in heaven.
    Mark Twain [Samuel Langhorne Clemens] (1835–1910)

    without luggage or defenses,
    giving up my car keys and my cash,
    keeping only a pack of Salem cigarettes
    the way a child holds on to a toy.
    I signed myself in where a stranger
    puts the inked-in X’s
    Anne Sexton (1928–1974)