1 |
So one can take advantage of both security approaches by using Public Key Infrastructure to initialize a session
|
2 |
Thereby they have set up joint knowledge of a secret key without usual disadvantages
|
3 | Note secret key is only used for this session and so one must break in real time |