Key-agreement Protocol - Shared Secret Keys

Shared Secret Keys

Secret-key (symmetric) cryptography requires the initial exchange of a shared key in a manner that is private and integrity-assured. When done right, MITM attack is prevented. However, without the use of public-key cryptography, one may be left with undesirable key-management problems.

Read more about this topic:  Key-agreement Protocol

Famous quotes containing the words shared, secret and/or keys:

    When young people are too rigidly sequestered from [the world], their lively and romantic imaginations paint it to them as a paradise of which they have been beguiled; but when they are shown it properly, and in due time, they see it such as it really is, equally shared by pain and pleasure, hope and disappointment.
    Frances Burney (1752–1840)

    For believe me!—the secret to harvesting the greatest abundance and the greatest enjoyment from existence is this—living dangerously! Build your cities on the slopes of Vesuvius! Send your ships into uncharted seas! Live at war with your peers and yourselves! Be robbers and conquerors, so long as you cannot be rulers and possessors, you knowing ones! The time will soon be past when you could be content to live hidden in the forests like timid deer.
    Friedrich Nietzsche (1844–1900)

    McCoy: That shark’s been following us ever since the surgeon died, waiting for the burial. Couldn’t I have a musket to shoot it, sir?
    Fletcher Christian: Take the deck, McCoy. I’ll get the keys to the arms chest.
    McCoy: Get two muskets, sir. I’d like to shoot that shark on board.
    Talbot Jennings (1896–1985)