To use ciphers and authenticators, the communicating participants need
to know what keys to use. In the case of a symmetric-key cipher, how does
a pair of participants obtain the key they share? In the case of a publickey cipher, how do participants know what public key belongs to a certain
participant? The answer differs depending on whether the keys are shortlived session keys or longer-lived predistributed keys.