## Overview#

Key-Exchange (also known as Key-Establishment) is any method in Cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm.[1]

Key-Exchange in Communication contexts if Successful results in Key agreement. Often Key-Exchange and Key agreement are used interchangeably. (As Ldapwiki sees it)

If Alice and Bob wish to exchange encrypted messages, each must be equipped to perform encryption on messages to be sent and perform decryption messages received. The nature of the equipping they require depends on the Encryption technique they might use.

If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys. If the Cipher is a Symmetric Key cipher, both will need a copy of the same key.

If an Asymmetric Key cipher with the Public Key/Private Key property, both will need the other's Public Key.

Preferably RSA should only be used for Authentication and the Key-Exchange should be performed using Diffie-Hellman key-exchange.

In TLS, the Key-Exchange is specified in the Cipher Suite the is negotiated with the ServerKeyExchange and the ClientKeyExchange Messages.

### More Information#

There might be more information for this subject on one of the following:- AES-GCM
- APEX
- Anonymous Cipher Suite
- Authentication
- Best Practices OpenID Connect
- Certificate-based Authentication
- Cipher Suite
- ClientKeyExchange
- Cryptographic Key
- Curve25519
- Curve448
- DH
- DHE
- DataEncipherment
- Demonstration of Proof-of-Possession
- Deprecating Secure Sockets Layer Version 3.0
- Diffie-Hellman
- Diffie-Hellman Ephemeral
- Diffie-Hellman key-exchange
- Diffie-Hellman or RSA
- Double Ratchet Algorithm
- ECDHE
- ECDHE_PSK
- Elliptic Curve
- Elliptic Curve Diffie-Hellman
- Elliptic Curve Diffie-Hellman Ephemeral
- Ephemeral Key
- Exchange
- How SSL-TLS Works
- Hybrid cryptosystem
- ISAKMP
- Key Encapsulation Method
- Key Management
- Key agreement
- Key-Establishment
- KeyEncipherment
- Known Cipher Suites
- Logjam
- Master Secret
- NMAS Result Codes
- NSA Suite B Cryptography
- OAuth 2.0 Message Authentication Code (MAC) Tokens
- Off-the-Record Messaging
- Open Protocol for Access Control, Identification, and Ticketing with privacY
- Over-the-Air Rekeying
- Password-authenticated Key Exchange
- Perfect Forward Secrecy
- RSA key-exchange
- ServerKeyExchange
- Session Key
- Shared Secret
- Symmetric Key Cryptography
- TLS 1.3
- The SRP Authentication and Key Exchange System
- Web Blog_blogentry_150617_1
- X25519

- [#1] - Key Exchange - based on 2015-03-23