Symmetric Cryptography - Shared secret or Symmetric Key

Card Puncher Data Processing


In symmetric cryptography, a shared secret is a secret key shared between the two parties.

It's also known as symmetric encryption key (ie in contrario to asymmetric)

Since the same key is used both to generate the signature and to validate it, care must be taken to ensure that the key is not compromised.

It's categorized as a something you have authentication.


The public key cryptographic scheme (asymmetric) is often used to exchange an on-the-fly symmetric key, which will only be used for the current session because it's much more performance efficient.

The most known example is SSL. At the start of a SSL connection (known as SSL handshake or negotiation), the two parties are using an asymmetric public key scheme to create and exchange a symmetric key that will be used to communicate for the time of the connection.

Recommended Pages
Jwt Auth Flow
Authentication - Jwt (Json web token)

json web token is a token protocol. It's also known as jot. The main purpose of JWTs is to transfer (ie identity property) between two parties This is a simple, optionally validated and/or encrypted,...
Card Puncher Data Processing
Authentication - Token

A token is a authentication material Token-based authentication is implemented by: generating a token when the user authenticates and then setting that token in the Authorization header of each...
Card Puncher Data Processing
Authentication Ways - something the person knows, has or is

Basically, there are three ways to authenticate an individual: by something the person knows, by something the person has, and by something the person is. All these ways have been used from...
Card Puncher Data Processing
Cryptography - Algorithm (called a Cipher)

A cipher is an algorithm that encrypt a plain text message into a ciphertext. Cipher algorithm can be categorized by the key that they used as parameters. No key symmetric one (using one key) ...
Card Puncher Data Processing
Cryptography - Encryption (Enciphering)

Encryption is the function of a cipher that transforms usable data into an unreadable form. It provides confidentiality if a secret is used in the encryption. There is two class of encryption. ...
Card Puncher Data Processing
Cryptography - Message authentication code (MAC) - (or Tag)

A Message authentication code (MAC) is a cryptographic algorithm that protects message: data integrity, and authenticity. Verifiers can detect any changes to the message content by applying a verifying...
Public Key Encrypt
Cryptography - Public Key Encryption

Public Key Encryption (PKE) is the encryption method of the public key cryptography that ensure that a communication is kept confidential (secrecy) during transit. Public Key encryption procedure:...
Card Puncher Data Processing
Cryptography - Secret / Private Key

/ Private Key A secret is a cryptographic material that should not be known by the public in order to secure the transaction. A secret is categorized as something you have authentication. It's also...
Card Puncher Data Processing
Diffie–Hellman key exchange

is a key exchange. in 1974, the GCHQ mathematician and cryptographer, Malcolm_J._WilliamsonMalcolm J. Williamson developed it. In the Diffie–Hellman_key_exchange scheme: each party generates a ...
Card Puncher Data Processing
Group Identifier (Secret that can be shared)

When identifying, you are not always identifying that the individual is a particular person, you are identifying if the person is of a particular group. Authentication Identification Type Why Group...

Share this page:
Follow us:
Task Runner