> Hey, that sounds like a key distribution problem! It is, quite literally. The scheme can be thought of as a message authentication code (MAC), with a shared key that has to be negotiated ahead of time; and just like with a MAC, anyone who has the secret key is capable of forging the message.