pre-shared key - Glossary | CSRC (2024)

    Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

pre-shared key

Definitions:

A secret key that has been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme).
Sources:
NIST SP 800-133 Rev. 2 under Pre-shared key

A secret key that has previously been established. See “pre-shared key” in Section 3.1 above.
Sources:
NIST SP 800-135 Rev. 1 under Pre-shared-key

A secret key that is established between communicating parties before a communication protocol starts.
Sources:
NIST SP 800-135 Rev. 1 under Pre-shared key

A secret key that has previously been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme).
Sources:
NIST SP 800-175B Rev. 1 under Pre-shared key

A single secret key used by IPsec endpoints to authenticate endpoints to each other.
Sources:
NIST SP 800-77 Rev. 1 under Pre-shared Key

Glossary Comments

Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.

Comments about the glossary's presentation and functionality should be sent to [email protected].

See NISTIR 7298 Rev. 3 for additional details.

pre-shared key - Glossary | CSRC (2024)

FAQs

Pre-shared key - Glossary | CSRC? ›

A secret key that has previously been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme). A single secret key used by IPsec endpoints to authenticate endpoints to each other.

What is a pre-shared key network term? ›

'Pre-shared key' means that a passphrase, or shared key, is set up in advance and is required to connect to the wireless network.

What is the PSK pass phrase? ›

The PSK is typically a passphrase or password that is known to both the network administrator (who configures the access point) and the users of the network (who enter the passphrase on their devices). During the initial setup, the client devices and the access point negotiate the encryption key based on the PSK.

What is my pre-shared key? ›

A pre-shared key (PSK) is a super-long series of seemingly random letters and numbers generated when a device joins a network through a Wi-Fi access point (AP). The process begins when a user logs into the network using the SSID (name of the network) and password (sometimes called a passphrase).

What is another name for a preshared key? ›

You can use a pre-shared key (PSK) (also called a shared secret) to authenticate the Cloud VPN tunnel to your peer VPN gateway.

Is a pre-shared key the same as a password? ›

A pre-shared key is basically just a shared secret or password that is used to authenticate an individual attempting to join a wireless network (no username or identification or than the key is required).

What is the difference between pre-shared keys and certificates? ›

Using a pre-shared key is less secure than using certificates, especially if it is used alone, without requiring peer IDs or extended authentication (XAuth). There also needs to be a secure way to distribute the pre-shared key to the peers.

What is an example of a PSK? ›

PSK value is a hard to guess string of hexadecimal digits, for example, "e560cb0d918d26d31b4f642181f5f570ad89a390931102e5391d08327ba434e9".

What is the explanation of PSK? ›

PSK uses a finite number of phases, each assigned a unique pattern of binary digits. Usually, each phase encodes an equal number of bits. Each pattern of bits forms the symbol that is represented by the particular phase.

What is the PSK in 4 way handshake? ›

 The first mode is Per-Shared Key (PSK), this mode operating in the small coverage area, it's called the personal mode. In this mode, the AP configured for having only one secret key (from 8 to 63 characters) used to authenticate clients with the AP [11] .

What is the pre-shared key algorithm? ›

Pre-shared key encryption (symmetric) uses algorithms like Twofish, AES, or Blowfish, to create keys—AES currently being the most popular. All of these encryption algorithms fall into two types: stream ciphers and block ciphers.

What is the PSK network key? ›

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

What is the difference between RSA and pre-shared key? ›

Therefore, RSA PSK uses the pre-shared key and server certificate for mutual authentication while RSA with mutual authentication uses both server and client certificates. In other words, RSA PSK can save the overhead due to transmission and verification of the client certificate but still achieve mutual authentication.

What is a secret pre-shared key? ›

Definitions: A secret key that has been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme). A secret key that has previously been established.

Is PSK the same as password? ›

Note: The WEP key or WPA/WPA2 preshared key/passphrase is not the same as the password for the access point. The password lets you access the access point settings. The WEP key or WPA/WPA2 preshared key/passphrase allows printers and computers to join your wireless network.

What is the difference between shared key authentication and pre-shared key? ›

If you protect a ZIP file with a password, this password becomes the shared key and it must be shared between all parties. That key is both shared (everyone uses the same) and pre-shared (its distribution isn't covered by the ZIP protocol and must be performed through a different secure channel before usage)

What is the use of Preshared key? ›

In WPA protocol, a Pre-Shared Key (PSK) serves as a foundational element, facilitating a symmetric encryption methodology to secure wireless networks. A PSK is a complex string of characters utilized by participants within a network to authenticate each other before a connection is established.

Top Articles
This Is How Much Money a $10K Credit Card Balance Could Cost You
Latest World & National News & Headlines
The Atlanta Constitution from Atlanta, Georgia
Videos De Mexicanas Calientes
7.2: Introduction to the Endocrine System
Directions To 401 East Chestnut Street Louisville Kentucky
P2P4U Net Soccer
Mustangps.instructure
Rochester Ny Missed Connections
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Nonne's Italian Restaurant And Sports Bar Port Orange Photos
Craigslist Motorcycles Orange County Ca
سریال رویای شیرین جوانی قسمت 338
Nj State Police Private Detective Unit
D10 Wrestling Facebook
Buff Cookie Only Fans
Kylie And Stassie Kissing: A Deep Dive Into Their Friendship And Moments
How to Create Your Very Own Crossword Puzzle
Vanessawest.tripod.com Bundy
Odfl4Us Driver Login
Hollywood Bowl Section H
Loft Stores Near Me
Rural King Credit Card Minimum Credit Score
Big Lots Weekly Advertisem*nt
John Chiv Words Worth
Menus - Sea Level Oyster Bar - NBPT
3 2Nd Ave
When Does Subway Open And Close
Cb2 South Coast Plaza
EVO Entertainment | Cinema. Bowling. Games.
Dhs Clio Rd Flint Mi Phone Number
Taylored Services Hardeeville Sc
Sacramento Craigslist Cars And Trucks - By Owner
897 W Valley Blvd
Eegees Gift Card Balance
Everything You Need to Know About Ñ in Spanish | FluentU Spanish Blog
Publix Daily Soup Menu
Ridge Culver Wegmans Pharmacy
About | Swan Medical Group
Justin Mckenzie Phillip Bryant
Today's Final Jeopardy Clue
Does Iherb Accept Ebt
In Polen und Tschechien droht Hochwasser - Brandenburg beobachtet Lage
Myql Loan Login
Wunderground Orlando
Acts 16 Nkjv
Woody Folsom Overflow Inventory
R/Gnv
Lux Funeral New Braunfels
Parks And Rec Fantasy Football Names
Yoshidakins
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5957

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.