

Once they share the secret key then they switch over to secret key algorithm to enjoy the fast speed. Out of band Public Key Encryption: Many use public key encryption to set up the initial communication link and exchange the secret key over this public key link.

Three main methods used to exchange secret key securely are: Offline Distribution: Through this secret key is exchanged physically. CISSP Official Study Guide 8 th & 9 th Edition Notes by Tariq Ali Shaikh 50 | P a g e Symmetric key Management: Creation and Distribution of Symmetric Keys: One of the major problems with symmetric encryption algorithm is the secure distribution of secret keys required to operate the algorithm.
