Symmetric Cryptography - Shared secret or Symmetric Key

About

In symmetric cryptography, a shared secret is a secret key shared between the two parties.

It's also known as symmetric encryption key (ie in contrario to asymmetric)

Since the same key is used both to generate the signature and to validate it, care must be taken to ensure that the key is not compromised.

It's categorized as a something you have authentication.

Exchange

The public key cryptographic scheme (asymmetric) is often used to exchange an on-the-fly symmetric key, which will only be used for the current session because it's much more performance efficient.

The most known example is SSL. At the start of a SSL connection (known as SSL handshake or negotiation), the two parties are using an asymmetric public key scheme to create and exchange a symmetric key that will be used to communicate for the time of the connection.





Discover More
Cryptography - Algorithm (called a Cipher)

A cipher is an algorithm that encrypt a plain text message into a ciphertext. Cipher algorithm can be categorized by the key that they used as parameters. No key symmetric one (using one key) ...
Cryptography - Encryption (Enciphering)

Encryption is the function of a cipher that transforms usable data into an unreadable form. It provides confidentiality if a secret is used in the encryption. There is two class of encryption. ...
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines: the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Cryptography - Message authentication code (MAC) - (or Tag)

A Message authentication code (MAC) is a cryptographic algorithm that protects message: data integrity, and authenticity. Verifiers can detect any changes to the message content by applying a verifying...
Public Key Encrypt
Cryptography - Public Key Encryption

Public Key Encryption (PKE) is the encryption method of the public key cryptography that ensure that a communication is kept confidential (secrecy) during transit. Public Key encryption procedure:...
Cryptography - Secret / Private Key

A secret is a cryptographic material that should not be known by the public in order to secure the transaction. A secret is categorized as something you have authentication. It's also known as the private...
Diffie–Hellman key exchange

is a key exchange. in 1974, the GCHQ mathematician and cryptographer, Malcolm_J._WilliamsonMalcolm J. Williamson developed it. In the Diffie–Hellman_key_exchange scheme: each party generates a ...
Group Identifier (Secret that can be shared)

When identifying, you are not always identifying that the individual is a particular person, you are identifying if the person is of a particular group. Authentication Identification Type Why Group...
Hash-based message authentication code (hmac)

HMAC or Hash-based message authentication code is a specific type of message authentication code (MAC) involving: a cryptographic hash function (SHA or MD5) and a secret cryptographic key. private...
Kerberos

is a authentication/authorization protcol using secret-key cryptography It allows single-sign-on system, which means that you have to type your password only once per session where does the authentication...



Share this page:
Follow us:
Task Runner