Introduction Some people are concerned that a working group outside of the Security Area is designing a key management protocols. Why? Key management protocols are subtle. An expert can easily miss a flaw. Peer review by multiple experts is essential. |