Abstract
With the cryptographic mechanisms that we have learned so far, in particular symmetric and asymmetric encryption, digital signatures and message authentication codes (MACs), one can relatively easily achieve the basic security services (cf. Sect. 10.1.3):
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Paar, C., Pelzl, J. (2010). Key Establishment. In: Understanding Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04101-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-04101-3_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-44649-8
Online ISBN: 978-3-642-04101-3
eBook Packages: Computer ScienceComputer Science (R0)