Key distribution

Key distribution

Importing Wikidata short description: "Methods used to share cryptographic key material with other parties"

← Previous revision Revision as of 16:41, 20 April 2026
Line 1: Line 1:
{{Short description|Methods used to share cryptographic key material with other parties}}
In [[symmetric key cryptography]], both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and unsafe, while the third depends on the security of a previous key exchange.
In [[symmetric key cryptography]], both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and unsafe, while the third depends on the security of a previous key exchange.