Shared Secret Keys
Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.
Read more about this topic: Key-agreement Protocol
Famous quotes containing the words shared, secret and/or keys:
“... perhaps there exists only one intelligence from which the world sublets, one intelligence toward which each person, from the depths of his individual body, directs his gaze, as in the theater where, though each has a seat, however, there is only one stage.... But if it we all shared the same intelligence, [Bergotte] would, upon hearing me express [my ideas], remember them, love them, smile at them....”
—Marcel Proust (18711922)
“We have always said that in our war with the Arabs we had a secret weaponno alternative.”
—Golda Meir (18981978)
“McCoy: That sharks been following us ever since the surgeon died, waiting for the burial. Couldnt I have a musket to shoot it, sir?
Fletcher Christian: Take the deck, McCoy. Ill get the keys to the arms chest.
McCoy: Get two muskets, sir. Id like to shoot that shark on board.”
—Talbot Jennings (18961985)