Key Distribution
Key Distribution. Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996. Symmetric Key Exchange Without Server. Assume that two users have a copy of a symmetric encryption key K. For a small number of messages, K may be used for encryption.
306 views • 9 slides