Ingemarsson, Tang and Wong established the first DCM protocol in 1982 [20] on the basis of Diffie Hellman`s most important two-headed agreement [19]. Followed by Koyama and Ohta [24], Blundo et al. [6] and Burmester and Desmedt [15]. Since then, much research on CPA and the safety of ACA protocols has been presented, in part because of the distributed and dynamic nature of the ACA and the security challenges to be solved – see z.B. [1, 5, 7, 8, 9, 10, 11, 12, 13, 16, 18, 23, 26, 27, 28, 29, 30, 31, 33, 34], and… The Key Agreement Group (GKA) is an extension of the bipartisan agreement to groups without ≥ two parties: it allows a group of several parties to create a meeting key (key) or conference key via an unprotected network. Key algorithms in the agreement, verified by the password, can exchange cryptographic keys using a user`s password knowledge. Keymous, which is verified by the password, requires the separate implementation of a password (which may be smaller than a key) in a way that is both private and integrity. These are designed to withstand Man-in-the-Middle and other active attacks on the password and established keys. For example, DH-EKE, SPEKE and SRP Diffie-Hellman are password authentication variants.

Commonly used key MOUs include diffie-hellman or protocols based on the RSA or ECC. Key mous that is verified by the password requires the separate implementation of a password (which may be smaller than a key) in a way that is both private and integrity. These are designed to withstand man-in-the-middle and other active attacks on the password and established keys. For example, DH-EKE, SPEKE and SRP are Diffie-Hellman password authentication variants. A large number of cryptographic authentication schemes and protocols have been designed to provide authenticated key agreements to prevent man-in-the-middle and related attacks. These methods generally mathematically link the agreed key to other agreed data, for example. B: The key installation can be divided overall into key transport and key agreements. Commonly used key agreement protocols include diffie-hellman or protocols based on the RSA or ECC. An example of a key MEMORANDUM of understanding is the key exchange of Diffie Hellman. In DH, both parties influence the resulting key and not just one part.