Key distribution studies how do people/entities get the keys they need to communicate securely.

The problem of key distribution

In Body’s theorem, without a secure, pre-existing channel, two entities cannot reliably establish an authenticated session directly.

Why not Diffie-Hellman

Diffie-Hellman Key Exchange enables two parties to create a shared secret over an insecure channel, but its security depends on the type of attacker present. Diffie-Hellman (DH) is secure if the attacker is passive; with an active attacker, we need to protect the DH key exchange with some form of origin authentication.

  • Passive attacker
    • A passive attacker can listen to the messages exchanged during