OurBigBook
About
$
Donate
Sign in
+
Sign up
by
Ciro Santilli
(
@cirosantilli,
37
)
Pre-shared key
...
Information technology
Computer
Computer science
Cryptography
Ciphertext, plaintext, key and salt
Key (cryptography)
0
Like
1 By others
on same topic
0 Discussions
Updated
2025-06-17
+
Created
1970-01-01
See my version
An overview of what you can do with
a
pre-shared key
with tradeoffs can be found at:
quantumcomputing.stackexchange.com/questions/142/advantage-of-quantum-key-distribution-over-post-quantum-cryptography/25727#25727
The options are:
one-time pad
symmetric encryption
authentication
with some
message authentication code
protocol
Table of contents
Message authentication code
Pre-shared key
Message authentication code
0
1
0
Pre-shared key
Bibliography:
crypto.stackexchange.com/questions/59958/is-it-safe-to-hash-a-packet-with-a-shared-secret-to-prove-authenticity
Ancestors
(9)
Key (cryptography)
Ciphertext, plaintext, key and salt
Cryptography
Computer science
Computer
Information technology
Area of technology
Technology
Home
Incoming links
(3)
Authentication (cryptography)
BB84
Quantum key distribution
View article source
Discussion
(0)
Subscribe (1)
+
New discussion
There are no discussions about this article yet.
Articles by others on the same topic
(1)
Show body
Body
0
Pre-shared key
by
Wikipedia Bot
0
1970-01-01
View more
A
Pre-shared Key
(PSK) is
a
shared secret
, typically
a
string of characters, used in
cryptographic protocols
for
authentication
. This key is known by both the client and the server before the
secure communication
starts. PSKs are commonly used in various security protocols, including:
1
. **
Wi-Fi
Security**: In
Wi-Fi
networks
, PSKs are often used in WPA (
Wi-Fi
Protected Access) and WPA2 for securing the network.
See all articles in the same topic
+
Create my own version