key exchange


Also found in: Acronyms, Wikipedia.

key exchange

In cryptography, the transfer of a secret key from one party to another. See key management.
References in periodicals archive ?
We assure our readers that RISTI--Revista Iberica de Sistemas e Tecnologias de Informacao will serve as a key exchange platform for publications in information science & technology field.
Security models for key exchange protocols have been researched for years, however, lots of them only focus on what secret can be compromised but they do not differentiate the timing of secrets compromise, such as the extended Canetti-Krawczyk (eCK) model.
Any eavesdropper spying on the quantum key exchange would be detected.
"Using Smarke facilitates the key exchange. Just give them the key using the phone and you revoke the key when you're done.
"A New Architecture for Authentication and Key Exchange Using Password for Federate Enterprises," Proc.
Now, by reducing the processing load of the core authenticated key exchange method, and by accelerating the arithmetic operation speed, the research team succeeded in developing authentication technology that could accommodate TLS.
For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies.
Therefore, it is necessary to build security layer over Internet for users' information security demand [7], especially to master fast key exchange technology.
Microsoft said users could disable the RSA key exchange ciphers that result in FREAK by changing the SSL Cipher Suite in the Group Policy Object Editor -- unless they are using Windows Server 2003, which does not allow for individual ciphers to be enabled and disabled.
(2.) Rouse, M., "Diffie-Hellman key exchange (exponential key exchange)," TechTarget, August 2007.
A public key based approach involves a key exchanging technique such as Differ Hellman key exchange. Both approaches have their own strengths and weaknesses and are appropriate for different application domains.