Skip to content

Key Exchange (Configuration)

Wesley Miaw edited this page May 25, 2018 · 1 revision

All key exchange mechanisms must prevent an unauthorized party from extracting session keys if the key request or response data is intercepted as key exchange will often be performed in the clear.

The following key exchange schemes are documented:

Clone this wiki locally