[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Question: Key Distr. in realtimeo applications?



> If so, how is this key distributed to both participants?

Find Diffie-Hellman in your Schneier.

D-H is a fundamental (in the sense of foundations) protocol which
transmits information "invisibly" (mathematically speaking).

For related invisibility, read about the Dining Cryptographers.

Cort.