Shared secret: Difference between revisions

Content deleted Content added
Undid revision 1030391933 by 2600:387:1:813:0:0:0:C5 (talk)
Adding PIN code as an example of a shared secret.
 
(7 intermediate revisions by 6 users not shown)
Line 1:
{{Short description|Computer password or cryptographic key}}
{{for|methods where a secret is divided into several parts|secret sharing}}
{{redirect|sharedShared secrets|the album by George Cables|Shared Secrets (album)}}
In [[cryptography]], a '''shared secret''' is a piece of data, known only to the parties involved, in a [[secure communication]]. This usually refers to the [[Key (cryptography)|key]] of a [[Symmetric-key algorithm|symmetric cryptosystem]]. The shared secret can be a [[personal identification number|PIN code]], a [[password]], a [[passphrase]], a big number, or an array of randomly chosen bytes.
 
The shared secret is either shared beforehand between the communicating parties, in which case it can also be called a [[pre-shared key]], or it is created at the start of the communication session by using a [[key-agreement protocol]], for instance using [[public-key cryptography]] such as [[Diffie–Hellman key exchange|Diffie–Hellman]] or using [[symmetric-key algorithm|symmetric-key cryptography]] such as [[Kerberos (protocol)|Kerberos]].
 
The shared secret can be used for authentication (for instance when logging intoin to a remote system) using methods such as [[challenge–response authentication|challenge–response]] or it can be fed to a [[key derivation function]] to produce one or more [[key (cryptography)|keys]] to use for encryption and/or [[message authentication code|MACing]] of messages.
 
To make unique [[session key|session and message keys]] the shared secret is usually combined with an [[initialization vector]] (IV). An example of this is the [[derived unique key per transaction]] method.