A key establishment protocol includes the generation of a value of
cryptographic function, typically a hash, of a session key and public
information. This value is transferred between correspondents together
with the information necessary to generate the session key. Provided the
session key has not been compromised, the value of the cryptographic
function will be the same at each of the a correspondents. The value of
the cryptographic function cannot be compromised or modified without
access to the session key.