This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals, although it will also be suitable as a supplementary text for graduate students and advanced undergraduates.