When two users or processes plan to use symmetric encryption to communicate, they need to exchange keys using a secure channel. This gives rise to the following two problems:
- Key protection: How to protect the symmetric encryption key.
- Key distribution: How to share the symmetric encryption key from the source to the destination.
Now, let's look at asymmetric encryption.