Advertisement

Key Agreement Protocols

  • Colin Boyd
  • Anish Mathuria
  • Douglas Stebila
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years. There is an intuitive feeling that key agreement is ‘fairer’ than key transport and can result in higher-quality random keys than key transport can. In addition, by basing key agreement on the Diffie–Hellman protocol, forward secrecy can often be achieved. We will consider these points further below. Notice that key agreement does not have to use public key cryptography, but most examples do so. In this chapter we look only at key agreement based on public key cryptography; some examples of key agreement using symmetric cryptography were discussed in Chap. 3.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Authors and Affiliations

  • Colin Boyd
    • 1
  • Anish Mathuria
    • 2
  • Douglas Stebila
    • 3
  1. 1.Department of Information Security and Communication TechnologyNorwegian University of Science and TechnologyTrondheimNorway
  2. 2.Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)GandhinagarIndia
  3. 3.Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooCanada

Personalised recommendations