3.6 Key establishment To communicate securely, Alice and Bob need to share the secret key in advance. According to [117], Def. 1.63, ”key establishment is any process whereby a shared secret key becomes available to two or more parties for subsequent cryptographic use”. In principle, Alice and Bob might meet in person in a cafe […]