We can now perform encryption and authentication using either public key techniques or symmetric key techniques. However, we have not addressed how parties actually obtain the public key of an entity, or obtain a shared symmetric key. When using hybrid ciphers in Section 16.3 we showed how a symmetric key could be transported to another party, and then that symmetric key used to encrypt a single message. However, we did not address what happens if we want to use the symmetric key many times, or use it for authentication etc. Nor did we address how the sender would know that the public key of the receiver he was using was genuine.
CITATION STYLE
Smart, N. P. (2016). Certificates, key transport and key agreement. In Information Security and Cryptography (Vol. 0, pp. 369–399). Springer International Publishing. https://doi.org/10.1007/978-3-319-21936-3_18
Mendeley helps you to discover research relevant for your work.