Symmetric Cryptography - Shared secret or Symmetric Key

About

In symmetric cryptography, a shared secret is a secret key shared between the two parties.

It's also known as symmetric encryption key (ie in contrario to asymmetric)

Since the same key is used both to generate the signature and to validate it, care must be taken to ensure that the key is not compromised.

It's categorized as a something you have authentication.

Exchange

The public key cryptographic scheme (asymmetric) is often used to exchange an on-the-fly symmetric key, which will only be used for the current session because it's much more performance efficient.

The most known example is SSL. At the start of a SSL connection (known as SSL handshake or negotiation), the two parties are using an asymmetric public key scheme to create and exchange a symmetric key that will be used to communicate for the time of the connection.





Discover More
Jwt Auth Flow
Authentication - Jwt (Json web token)

json web token is a token. It's also known as jot. When a JWT is signed, it becomes a JWS and can be used for sender authentication and authorization. The main purpose of JWTs is to transfer (ie identity...
Authentication - Token

A token is a authentication material Token-based authentication is implemented by: generating a token when the user authenticates and then setting that token in the Authorization header of each...
Authentication Ways - something the person knows, has or is

Basically, there are three ways to authenticate an individual: by something the person knows, by something the person has, and by something the person is. All these ways have been used from...
Cryptography - Algorithm (called a Cipher)

A cipher is an algorithm that encrypt a plain text message into a ciphertext. Cipher algorithm can be categorized by the key that they used as parameters. No key symmetric one (using one key) ...
Cryptography - Encryption (Enciphering)

Encryption is the function of a cipher that transforms usable data into an unreadable form. It provides confidentiality if a secret is used in the encryption. There is two class of encryption. ...
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines: the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Cryptography - Message authentication code (MAC) - (or Tag)

A Message authentication code (MAC) is a cryptographic algorithm that protects message: data integrity, and authenticity. Verifiers can detect any changes to the message content by applying a verifying...
Public Key Encrypt
Cryptography - Public Key Encryption

Public Key Encryption (PKE) is the encryption method of the public key cryptography that ensure that a communication is kept confidential (secrecy) during transit. Public Key encryption procedure:...
Cryptography - Secret

A secret is a cryptographic material that should not be known by the public in order to secure the transaction. A secret is categorized as something you have authentication. It's also known as the private...
Diffie–Hellman key exchange

is a key exchange. in 1974, the GCHQ mathematician and cryptographer, Malcolm_J._WilliamsonMalcolm J. Williamson developed it. In the Diffie–Hellman_key_exchange scheme: each party generates a ...



Share this page:
Follow us:
Task Runner