en.wikipedia.org/wiki/Key-agreement_protocol key equipment can be subdivided into key traffic and key agreements. The most important agreement is that the key source must be such that at the end of the process, two specific entities know the key and only these. A perfect example is the Diffie-Hellman protocol, in which both parties use randomness to create data elements, exchange some of these elements, and make some calculations that end up getting the same result, while external observers are not impressed. Definition Reference: Chapter 12 of the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. In general, the key DH agreement method is used more (both in terms of calculation and bandwidth) than previous ones and requires quotas as in the case of the public key. However, it has the advantage of offering perfect forward secrecy (PFS) and flexibility in allowing implementation in several finite groups. Key agreements of the Conference; Keying conference; The distribution of group keys Exchange of group keys Please, someone can explain in simple terms what is the difference between the key value of the value and the key agreement.
In what situation I would use it. Many key exchange systems have a part that generates the key and simply sends that key to the other party — the other party has no influence on the key. The use of a key MEMORANDUM of understanding avoids some of the major distribution problems associated with these systems. Ingemarsson, Tang and Wong introduced the first GKA protocol in 1982  on the basis of the key two-headed Diffie Hellman agreement . Followed by koyama and Ohta , Blundo et al.  and Burmester and Desmedt . Since then, a great deal of research on CPA and the security of ACA protocols has been presented, in part because of the distributed and dynamic nature of the ACA and the security challenges to be solved – see z.B. [1, 5, 7, 8, 9, 10, 11, 12, 13, 16, 18, 23, 26, 27, 28, 29, 30, 31, 33, 34], and…
In cryptography, a key memorandum of understanding is a protocol in which two or more parties can agree on a key so that both influence the outcome. If this is done correctly, it prevents undesirable third parties from imposing an important decision on the appropriate parties. Protocols that are useful in practice also do not reveal to a listening party the key that has been agreed upon. A large number of cryptographic authentication schemes and protocols have been designed to provide authenticated key agreements to prevent man-in-the-middle and related attacks. These methods generally mathematically link the agreed key to other agreed data, such as. B: The exponential key exchange does not give prior agreement or subsequent authentication between participants. It has therefore been described as an anonymous key memorandum of understanding. Commonly used key agreement protocols include diffie-hellman or protocols based on the RSA or ECC.
The key exchange protocol is considered an important part of the cryptographic mechanism to protect end-to-end communications security. An example of the key exchange protocol is the exchange of Hellman files and keys [DIF 06, STA 10], which is known to be vulnerable to attack. To ensure a secure key exchange, [CHI 11] proposed a three-way exchange and agreement protocol (TW-KEAP). This minutes provide both parties to the communication with the same key to meeting secure communication. The TW-KEAP concept stems from the four-part key exchange protocol, in which two customers are registered among the two different servers, and has expanded the benefits of the previous two protocols.