A key establishment protocol includes the generation of a value of
cryptographic function, typically a hash, of a session key and public
information. This value is transferred between correspondents together
with the information necessary to generate the session key. Provided the
session key has not been compromised, the value of the cryptographic
function will be the same at each of the correspondents. The value of the
cryptographic function cannot be compromised or modified without access to
the session key.