Key Distribution Management
So far we have covered the two types of cryptography:
- Symmetric key encryption uses a secret key shared by sender and recipient. It is good for encrypting large amounts of data.
- Asymmetric (public) key encryption uses two keys, a public and a private key. It is less inefficient for large amounts of data, but it is good for authentication.
Now, the question is (1) How to share symmetric keys? and (2) How to distribute public keys?
Symmetric Key Distribution Using Symmetric Encryption
The objective is for two entities to share the same secret key. For two parties, let’s call $A$ and $B$, key distribution can be achieved in a number of ways, as follows:
- $A$ can select a key and physically deliver it to $B$.
- A third party can select the key and physically deliver it to $A$ and $B$.
- If $A$ and $B$ have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key.
- If $A$ and $B$ each has an encrypted connection to a third party $C$, $C$ can deliver a key on the encrypted links to $A$ and $B$.
Analyzing the four key distribution options:
- Options 1 and 2 fall under manual delivery, suitable for small-scale systems. These options are feasible for link encryption.
- Option 3 relies on the initial key distribution, with the discovery of the initial key leading to subsequent key releases. This is a possibility for either encryption, but if an attacker ever succeeds in gaining access to one key, then all subsequent keys will be revealed.
- Option 4 involves the initial distribution of keys with the third party $C$ and is practical for large-scale systems. This is widely adopted for end-to-end encryption.
Link and end-to-end encryption are two distinct strategies for securing confidentiality in a network.

Figure 4.1 Link and end-to-end encryption.
- Link-level encryption typically involves symmetric key cryptography.
- Encrypts data over individual links in network.
- Each link end-point shares a secret key.
- Encryption and decryption occur at each device in the communication path.