Key Exchange

Key exchange (also known as "key establishment") is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm.

If sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys. If the cipher is a symmetric key cipher, both will need a copy of the same key. If an asymmetric key cipher with the public/private key property, both will need the other's public key.

Read more about Key ExchangeThe Key Exchange Problem, The Future

Other articles related to "key exchange, key, keys, exchange":

Password Authenticated Key Exchange By Juggling
... In cryptography, the Password Authenticated Key Exchange by Juggling (or J-PAKE) is a password-authenticated key agreement protocol ... communication solely based on their shared (low-entropy) password without requiring a Public Key Infrastructure ... It provides mutual authentication to the key exchange, a feature that is lacking in the Diffie-Hellman key exchange protocol ...
Key Management - Key Exchange
... instances this may require exchanging identical keys (in the case of a symmetric key system) ... it may require possessing the other party's public key ... While public keys can be openly exchanged (their corresponding private key is kept secret), symmetric keys must be exchanged over a secure communication channel ...
Public-key Cryptography - History
... of cryptography, two parties would rely upon a key using a secure, but non-cryptographic, method ... For example, a face-to-face meeting or an exchange, via a trusted courier, could be used ... This key, which both parties kept absolutely secret, could then be used to exchange encrypted messages ...
Key Exchange - The Future
... The problem of key exchange has not yet been solved ... In particular, it has not yet been solved for the modern situation of two previously unknown users attempting to communicate electronically, as, for instance, in electronic commerce ...
Neural Cryptography - Neural Key Exchange Protocol - Security Against Quantum Computers
... Neural key exchange protocol is not based on any number theory ... Therefore, something like the neural key exchange protocol could give rise to potentially faster key exchange schemes ...

Famous quotes containing the words exchange and/or key:

    If mass communications blend together harmoniously, and often unnoticeably, art, politics, religion, and philosophy with commercials, they bring these realms of culture to their common denominator—the commodity form. The music of the soul is also the music of salesmanship. Exchange value, not truth value, counts.
    Herbert Marcuse (1898–1979)

    Experience has shown that the trade of the East is the key to national wealth and influence.
    Chester A. Arthur (1829–1886)