Handbook of Applied Cryptography - chap12
This chapter considers key establishment protocols and related cryptographic techniques
which provide shared secrets between two or more parties, typically for subsequent use
as symmetric keys for a variety of cryptographic purposes including encryption, message
authentication, and entity authentication. The main focus is two-party key establishment,
with the aid of a trusted third party in some cases. While many concepts extend naturally to
multi-party key establishment including conference keying protocols, such protocols rapidly
become more complex, and are considered here only briefly, as is the related area of secret
sharing. Broader aspects of key management, including distribution of public keys, certificates,
and key life cycle issues, are deferred...