Key-agreement Protocol - Shared Secret Keys

Shared Secret Keys

Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.

Read more about this topic:  Key-agreement Protocol

Famous quotes containing the words shared, secret and/or keys:

    Prose—it might be speculated—is discourse; poetry ellipsis. Prose is spoken aloud; poetry overheard. The one is presumably articulate and social, a shared language, the voice of “communication”; the other is private, allusive, teasing, sly, idiosyncratic as the spider’s delicate web, a kind of witchcraft unfathomable to ordinary minds.
    Joyce Carol Oates (b. 1938)

    ... in writing you cannot possibly be interesting if what you say is not true, if it is what I call “a true lie,” i.e., a truth which gives the wrong impression. For no matter how subtly you lie in writing, people know it and don’t believe you, and the whole secret of being interesting is to be believed.
    Brenda Ueland (1891–1985)

    Thou hast the keys of Paradise, O just, subtle, and mighty opium!
    Thomas De Quincey (1785–1859)