- two parties (Alice and Bob)
- don’t know each other
- communicate over insecure channel
- need both the same key to use symmetric cryptography, e.g. AES
Alice starts. She generates a key, puts it in a box, and locks it – with a padlock that only she has the key to open.