pre-shared key - Glossary | CSRC (2024)

    Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

pre-shared key

Definitions:

A secret key that has been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme).
Sources:
NIST SP 800-133 Rev. 2 under Pre-shared key

A secret key that has previously been established. See “pre-shared key” in Section 3.1 above.
Sources:
NIST SP 800-135 Rev. 1 under Pre-shared-key

A secret key that is established between communicating parties before a communication protocol starts.
Sources:
NIST SP 800-135 Rev. 1 under Pre-shared key

A secret key that has previously been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme).
Sources:
NIST SP 800-175B Rev. 1 under Pre-shared key

A single secret key used by IPsec endpoints to authenticate endpoints to each other.
Sources:
NIST SP 800-77 Rev. 1 under Pre-shared Key

Glossary Comments

Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.

Comments about the glossary's presentation and functionality should be sent to [email protected].

See NISTIR 7298 Rev. 3 for additional details.

pre-shared key - Glossary | CSRC (2024)

FAQs

Pre-shared key - Glossary | CSRC? ›

A secret key that has previously been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme). A single secret key used by IPsec endpoints to authenticate endpoints to each other.

What is a pre-shared key network term? ›

'Pre-shared key' means that a passphrase, or shared key, is set up in advance and is required to connect to the wireless network.

What is the PSK pass phrase? ›

The PSK is typically a passphrase or password that is known to both the network administrator (who configures the access point) and the users of the network (who enter the passphrase on their devices). During the initial setup, the client devices and the access point negotiate the encryption key based on the PSK.

What is my pre-shared key? ›

A pre-shared key (PSK) is a super-long series of seemingly random letters and numbers generated when a device joins a network through a Wi-Fi access point (AP). The process begins when a user logs into the network using the SSID (name of the network) and password (sometimes called a passphrase).

What is another name for a preshared key? ›

You can use a pre-shared key (PSK) (also called a shared secret) to authenticate the Cloud VPN tunnel to your peer VPN gateway.

Is a pre-shared key the same as a password? ›

A pre-shared key is basically just a shared secret or password that is used to authenticate an individual attempting to join a wireless network (no username or identification or than the key is required).

What is the difference between pre-shared keys and certificates? ›

Using a pre-shared key is less secure than using certificates, especially if it is used alone, without requiring peer IDs or extended authentication (XAuth). There also needs to be a secure way to distribute the pre-shared key to the peers.

What is an example of a PSK? ›

PSK value is a hard to guess string of hexadecimal digits, for example, "e560cb0d918d26d31b4f642181f5f570ad89a390931102e5391d08327ba434e9".

What is the explanation of PSK? ›

PSK uses a finite number of phases, each assigned a unique pattern of binary digits. Usually, each phase encodes an equal number of bits. Each pattern of bits forms the symbol that is represented by the particular phase.

What is the PSK in 4 way handshake? ›

 The first mode is Per-Shared Key (PSK), this mode operating in the small coverage area, it's called the personal mode. In this mode, the AP configured for having only one secret key (from 8 to 63 characters) used to authenticate clients with the AP [11] .

What is the pre-shared key algorithm? ›

Pre-shared key encryption (symmetric) uses algorithms like Twofish, AES, or Blowfish, to create keys—AES currently being the most popular. All of these encryption algorithms fall into two types: stream ciphers and block ciphers.

What is the PSK network key? ›

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

What is the difference between RSA and pre-shared key? ›

Therefore, RSA PSK uses the pre-shared key and server certificate for mutual authentication while RSA with mutual authentication uses both server and client certificates. In other words, RSA PSK can save the overhead due to transmission and verification of the client certificate but still achieve mutual authentication.

What is a secret pre-shared key? ›

Definitions: A secret key that has been established between the parties who are authorized to use it by means of some secure method (e.g., using a secure manual-distribution process or automated key-establishment scheme). A secret key that has previously been established.

Is PSK the same as password? ›

Note: The WEP key or WPA/WPA2 preshared key/passphrase is not the same as the password for the access point. The password lets you access the access point settings. The WEP key or WPA/WPA2 preshared key/passphrase allows printers and computers to join your wireless network.

What is the difference between shared key authentication and pre-shared key? ›

If you protect a ZIP file with a password, this password becomes the shared key and it must be shared between all parties. That key is both shared (everyone uses the same) and pre-shared (its distribution isn't covered by the ZIP protocol and must be performed through a different secure channel before usage)

What is the use of Preshared key? ›

In WPA protocol, a Pre-Shared Key (PSK) serves as a foundational element, facilitating a symmetric encryption methodology to secure wireless networks. A PSK is a complex string of characters utilized by participants within a network to authenticate each other before a connection is established.

Top Articles
Elder Abuse Awareness Is on the Rise | Los Angeles Estate Planning Attorney
5 Most Common Incoterms for Shipping | Definitions + Meanings [w/ PDF]
Truist Bank Near Here
DL1678 (DAL1678) Delta Historial y rastreo de vuelos - FlightAware
Wild Smile Stapleton
Victoria Secret Comenity Easy Pay
Where's The Nearest Wendy's
Orlando Arrest and Public Records | Florida.StateRecords.org
Ree Marie Centerfold
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
Worcester On Craigslist
How Much Is Tj Maxx Starting Pay
Binghamton Ny Cars Craigslist
7 Low-Carb Foods That Fill You Up - Keto Tips
735 Reeds Avenue 737 & 739 Reeds Ave., Red Bluff, CA 96080 - MLS# 20240686 | CENTURY 21
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
Canvas Nthurston
Boston Gang Map
Prosser Dam Fish Count
E22 Ultipro Desktop Version
Weepinbell Gen 3 Learnset
Chaos Space Marines Codex 9Th Edition Pdf
Rimworld Prison Break
Aol News Weather Entertainment Local Lifestyle
Ceramic tiles vs vitrified tiles: Which one should you choose? - Building And Interiors
104 Presidential Ct Lafayette La 70503
Synergy Grand Rapids Public Schools
Kimoriiii Fansly
§ 855 BGB - Besitzdiener - Gesetze
Kitchen Exhaust Cleaning Companies Clearwater
Mikayla Campinos: Unveiling The Truth Behind The Leaked Content
Sams Gas Price Sanford Fl
Sandals Travel Agent Login
Ups Drop Off Newton Ks
Transformers Movie Wiki
Rust Belt Revival Auctions
Hattie Bartons Brownie Recipe
Hermann Memorial Urgent Care Near Me
Deshuesadero El Pulpo
18 terrible things that happened on Friday the 13th
10 Rarest and Most Valuable Milk Glass Pieces: Value Guide
Kutty Movie Net
Rocky Bfb Asset
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
15 Best Places to Visit in the Northeast During Summer
Hello – Cornerstone Chapel
Unblocked Games 6X Snow Rider
Acuity Eye Group - La Quinta Photos
Coleman Funeral Home Olive Branch Ms Obituaries
sin city jili
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5957

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.