Abstract
Key agreement, as the name implies, is a process in which principals cooperate in order to establish a session key. Amongst the class of public key protocols for key establishment without a server, key agreement has become much more popular than key transport in recent years. There is an intuitive feeling that key agreement is ‘fairer’ than key transport and can result in higher quality random keys than key transport. In addition, by basing key agreement on the Diffie—Hellman protocol, forward secrecy can often be achieved. We will consider these points further below. Notice that key agreement does not have to use public key cryptography but most examples do so. In this chapter we look only at key agreement based on public key cryptography; some examples of key agreement using symmetric cryptography are discussed in Chap. 3.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Boyd, C., Mathuria, A. (2003). Key Agreement Protocols. In: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-09527-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-09527-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07716-6
Online ISBN: 978-3-662-09527-0
eBook Packages: Springer Book Archive