7 Key Agreement Scheme (KAS) Algorithms
Key Agreement algorithms facilitate the generation of a shared secret between two parties. These parties exchange data to create this shared secret. Subsequently, the shared secret can either be utilized to derive a symmetric key or directly employed as a key itself. This derived key or the key can then be utilized to establish encrypted communication using symmetric key-based cipher algorithms. The Crypto v4 Library supports ECDH algorithm.