Content deleted Content added
No edit summary |
Adding PIN code as an example of a shared secret. |
||
(17 intermediate revisions by 15 users not shown) | |||
Line 1:
{{Short description|Computer password or cryptographic key}}
{{for|methods where a secret is divided into several parts|secret sharing}}
{{redirect|
In [[cryptography]], a '''shared secret''' is a piece of data, known only to the parties involved, in a [[secure communication]]. This usually refers to the [[Key (cryptography)|key]] of a [[Symmetric-key algorithm|symmetric cryptosystem]]. The shared secret can be a [[personal identification number|PIN code]], a [[password]], a [[passphrase]], a big number, or an array of randomly chosen bytes.
The shared secret is either shared beforehand between the communicating parties, in which case it can also be called a [[pre-shared key]], or it is created at the start of the communication session by using a [[key-agreement protocol]], for instance using [[public-key cryptography]] such as [[Diffie–Hellman key exchange|
The shared secret can be used for authentication (for instance when logging
To make unique [[
It is also often used as an authentication measure in [[web API]]s.{{Citation needed|reason=Original citation did not lead to a webpage.|date=May 2017}}
== See also ==
▲* [[Key stretching]] – A method to create a stronger key from a weak key or a weak shared secret.
* [[Security question]] – implementation method
{{reflist}}▼
== References ==
* ''[http://www.cacr.math.uwaterloo.ca/hac/ Handbook of Applied Cryptography]'' by Menezes, van Oorschot and Vanstone (2001), chapter 10 and 12.
▲{{reflist}}
{{Cryptography navbox}}
|