Certificates, key transport and key agreement

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We can now perform encryption and authentication using either public key techniques or symmetric key techniques. However, we have not addressed how parties actually obtain the public key of an entity, or obtain a shared symmetric key. When using hybrid ciphers in Section 16.3 we showed how a symmetric key could be transported to another party, and then that symmetric key used to encrypt a single message. However, we did not address what happens if we want to use the symmetric key many times, or use it for authentication etc. Nor did we address how the sender would know that the public key of the receiver he was using was genuine.

Cite

CITATION STYLE

APA

Smart, N. P. (2016). Certificates, key transport and key agreement. In Information Security and Cryptography (Vol. 0, pp. 369–399). Springer International Publishing. https://doi.org/10.1007/978-3-319-21936-3_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free