This topic covers methods for exchanging keys between parties that are communicating via encrypted channels.