An example of a key transport protocol is that a player generates a symmetric key and encrypts the key under the receiver`s public key with asymmetric cryptography. This is a key transport protocol (sometimes called a key encapsulation mechanism or KEM) and not a key agreement, because the key to the inputs depends only on one party: the sender. The key is generated by one party and then transported to the other party. Authenticated key protocols require the separate setting of a password (which can be smaller than a key) in a way that is both private and integrity. These are designed to withstand man-in-the-middle attacks and other active attacks against the password and established keys. For example, DH-EKE, SPEKE, and SRP are authenticated variations of Diffie-Hellman. Two PAKE (Password Authentication Key Exchange) protocols with four parts [YEH 05]: one is KTAP (Key Transfer Authentication Protocol) with four parts and the other is kaAP (Key Agreement Authentication Protocol). However, there is a downside to this protocol, as it could be a vulnerable point of attack, while it cannot support lawful interception. Major branches can be roughly divided into key traffic and key agreements.
Could someone explain in simple terms what is the difference between the key and the key agreement? In what situation I would use it. A key protocol or agreement mechanism is a key-fixing technique that involves establishing a common secret between two (or more) parties as a function of information provided or linked by each of those parties, so that no party can (ideally) determine the resulting value beforehand. In this process, key restoration is done collaboratively, so both parties have the key. The first publicly known public key memorandum of understanding that meets the above criteria was the Diffie-Hellman key exchange, in which two parties together expose a random generator in such a way that a listener cannot determine in a feasible way what is the resulting value used to make a common key. en.wikipedia.org/wiki/Key-agreement_protocol algorithms of a key agreement password authentication can perform a cryptographic exchange of keys, in which a user`s password is known. Many key exchange systems allow one party to generate the key and send that key simply to the other party – the other party has no influence on the key. Using a key-agreement protocol avoids some key distribution issues related to these systems. A key memorandum of understanding is usually called after two parts have been authenticated….