To use data encryption algorithms in network communications, all parities must first agree on using the same secret keys Rely on couriers Set up a meeting to determine a secret key Use postal service, email service, phone service However, these conventional methods are inflexible for network communication applications Public-key cryptography (PKC) Invented in the 1970’s Without the need of sharing prior secrets to distribute secret keys securely Can also be used for authentication