The key distribution problem
How do we get you a key without somebody else subverting the process?
- By stealing the key along the way
- By replacing the key along the way
- By preventing distribution
- By corrupting the distributed key
- By corrupting the distribution process
- Initial vs. Subsequent distribution
- Re-distribution of old keys