From 4bbc02862404dde8c3c453c14342d3df8b31672f Mon Sep 17 00:00:00 2001 From: Bruce Davie <3101026+drbruced12@users.noreply.github.com> Date: Thu, 31 Jul 2025 12:52:38 +1000 Subject: [PATCH] change title and cover shared secrets --- key-distro.rst | 24 +++++++++++++++--------- 1 file changed, 15 insertions(+), 9 deletions(-) diff --git a/key-distro.rst b/key-distro.rst index 47b9718..88fbde0 100644 --- a/key-distro.rst +++ b/key-distro.rst @@ -1,4 +1,4 @@ -Chapter 4. Key Predistribution +Chapter 4. Key Distribution =============================== We have seen that ciphers and authentication codes are parameterized @@ -32,13 +32,19 @@ session keys and predistributed keys: bulk traffic for confidentiality. This chapter explains how predistributed keys are distributed, and then -explains how session keys are subsequently established. We -henceforth use “Alice” and “Bob” to designate participants, as is common -in the cryptography literature. Bear in mind that although we tend to -refer to participants in anthropomorphic terms, we are more frequently -concerned with the communication between software or hardware entities -such as clients and servers that often have no direct relationship with -any particular person. +explains how session keys are subsequently established. Note that +session keys are a particular example of a shared secret, and in some cases +there is a need for more than just a simple session key. In such cases we +use the more general terminology of "shared secret establishment" +rather than "session key distribution". The basic principles are the +same. + +We henceforth use “Alice” and “Bob” to designate participants, as is +common in the cryptography literature. Bear in mind that although we +tend to refer to participants in anthropomorphic terms, we are more +frequently concerned with the communication between software or +hardware entities such as clients and servers that often have no +direct relationship with any particular person. 4.1 Predistribution of Public Keys ------------------------------------ @@ -280,7 +286,7 @@ certificate when it is issued. Thus, we can limit the length of time that a revoked certificate needs to stay on a CRL. As soon as its original expiration date is passed, it can be removed from the CRL. -4.2 Predistribution of Secret Keys +4.2 Distribution of Secret Keys ------------------------------------ Secret key ciphers present a bootstrapping problem: how do you