So one can take advantage of both security approaches by using Public Key Infrastructure to initialize a session
|
Thereby they have set up joint knowledge of a secret key without usual disadvantages
|
Note secret key is only used for this session and so one must break in real time |