Given an authentic communication channel, a key agreement protocol enables two parties to obtain a common bit string (the key), such that an eavesdropper does not have any information about it, even if he observes the whole communication. While no such protocol is secure in an information theoretic sense, it seems possible to give a key agreement protocol which is secure against eavesdroppers w...