Many public-key encryption schemes have been discussed which ensure data or information security only if the authenticity of the public key is assured. the public key can be secured with the help of a public-key certificate scheme. Several algorithms are formulated to offer secure key exchange. To implement symmetric key cryptography, the two parties involved in data exchange, should exchange the key for encryption/decryption which should be protected from unauthorized access and modification.
The strength of any cryptographic system lies in the key distribution technique, the term refers to the process of delivering a cryptographic key between two parties who wish to exchange data. The public key cryptography includes two distinct aspects distribution of public keys and use of public key encryption technique to distribute secret keys.