OurBigBook About$ Donate
 Sign in+ Sign up
by Ciro Santilli (@cirosantilli, 37)

Pre-shared key

 ... Information technology Computer Computer science Cryptography Ciphertext, plaintext, key and salt Key (cryptography)
 1 By others on same topic  0 Discussions  Updated 2025-05-26  +Created 1970-01-01  See my version
An overview of what you can do with a pre-shared key with tradeoffs can be found at: quantumcomputing.stackexchange.com/questions/142/advantage-of-quantum-key-distribution-over-post-quantum-cryptography/25727#25727 The options are:
  • one-time pad
  • symmetric encryption
  • authentication with some message authentication code protocol
  • Table of contents
    • Message authentication code Pre-shared key

Message authentication code

 1  0 
Pre-shared key
Bibliography:
  • crypto.stackexchange.com/questions/59958/is-it-safe-to-hash-a-packet-with-a-shared-secret-to-prove-authenticity

 Ancestors (9)

  1. Key (cryptography)
  2. Ciphertext, plaintext, key and salt
  3. Cryptography
  4. Computer science
  5. Computer
  6. Information technology
  7. Area of technology
  8. Technology
  9.  Home

 Incoming links (3)

  • Authentication (cryptography)
  • BB84
  • Quantum key distribution

 View article source

 Discussion (0)

+ New discussion

There are no discussions about this article yet.

 Articles by others on the same topic (1)

Pre-shared key by Wikipedia Bot 0  1970-01-01
 Read the full article
  See all articles in the same topic + Create my own version
 About$ Donate Content license: CC BY-SA 4.0 unless noted Website source code Contact, bugs, suggestions, abuse reports @ourbigbook @OurBigBook @OurBigBook