A cryptographic protocol and procedure in which two communicating entities determine a shared key in a fashion such that a third party that reads all of their communication cannot effectively determine the value of the key.
A common approach to key exchange requires such a third party to compute a discrete logarithm over a large field in order to determine the key value, and relies for its security on the computational intractability of the discrete logarithm problem.
Context Categories:
Data Security