\subsubsection{Key Exchange}
Many algorithms allow secure key exchange. Those are RSA, DH, EDH, ECDSA,
-ECDH, EECDH amongst others During the key exchange, keys for authentication and
-for encryption are exchanged. %%For RSA and DSA those keys are the same. %%
-WHAT?
+ECDH, EECDH amongst others. During the key exchange, keys used for authentication
+and symmetric encryption are exchanged. For RSA, DSA and ECDSA those keys are derrived
+from the server's public key.
\todo{explain this section}