Key distribution
Importing Wikidata short description: "Methods used to share cryptographic key material with other parties"
| ← Previous revision | Revision as of 16:41, 20 April 2026 | ||
| Line 1: | Line 1: | ||
{{Short description|Methods used to share cryptographic key material with other parties}} |
|||
In [[symmetric key cryptography]], both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and unsafe, while the third depends on the security of a previous key exchange. |
In [[symmetric key cryptography]], both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and unsafe, while the third depends on the security of a previous key exchange. |
||