Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Shared secret 44 found (708 total)

alternate case: shared secret

Time-based one-time password (691 words) [view diff] exact match in snippet view article find links to article

the credentials in real time. TOTP credentials are also based on a shared secret known to both the client and the server, creating multiple locations
Layer 2 Tunneling Protocol (1,825 words) [view diff] exact match in snippet view article find links to article
('hiding') only for its own control messages (using an optional pre-shared secret), and does not provide any encryption or confidentiality of content
Key-agreement protocol (803 words) [view diff] exact match in snippet view article find links to article
other agreed-upon data, such as the following: Public/private key pairs Shared secret keys Passwords A widely used mechanism for defeating such attacks is
OpenVPN (1,965 words) [view diff] exact match in snippet view article find links to article
applications. OpenVPN allows peers to authenticate each other using pre-shared secret keys, certificates or username/password. When used in a multiclient-server
Public-key cryptography (4,031 words) [view diff] exact match in snippet view article find links to article
establishing a shared secret-key over an authenticated (but not confidential) communications channel without using a prior shared secret. Merkle's "public
Key exchange (1,394 words) [view diff] exact match in snippet view article find links to article
each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher
Silent Circle Instant Messaging Protocol (206 words) [view diff] exact match in snippet view article find links to article
secrecy and message authentication. It also handled negotiating the shared secret keys. Silent Circle used SCIMP in their encrypted instant messaging
Generic Bootstrapping Architecture (847 words) [view diff] exact match in snippet view article find links to article
authentication request, the BSF establishes a shared secret between the simcard card and the service provider. This shared secret is limited in time and for a specific
Universal 2nd Factor (1,497 words) [view diff] no match in snippet view article find links to article
considered regarding hardware-based U2F solutions is that unlike with TOTP shared-secret methods, there is no possibility of "backing up" recovery codes or shared
GrIDsure (443 words) [view diff] no match in snippet view article find links to article
GrIDsure was a personal identification system which extends the standard ‘shared-secret’ authentication model to create a secure methodology whereby a dynamic
ZRTP (1,256 words) [view diff] exact match in snippet view article find links to article
protocol such as Session Initiation Protocol (SIP). This generates a shared secret which is then used to generate keys and salt for a Secure RTP (SRTP)
X.1035 (230 words) [view diff] exact match in snippet view article find links to article
from the man-in-the-middle attack. The authentication relies on a pre-shared secret (e.g., password), which is protected (i.e., remains unrevealed) to an
Non-repudiation (1,247 words) [view diff] exact match in snippet view article find links to article
(MAC), useful when the communicating parties have arranged to use a shared secret that they both possess, does not give non-repudiation. A misconception
TLS-PSK (306 words) [view diff] exact match in snippet view article find links to article
case is when the parties already have a mechanism for setting up a shared secret key, and that mechanism could be used to “bootstrap” a key for authenticating
Quantum key distribution (11,612 words) [view diff] exact match in snippet view article find links to article
each other's identities (such as an initial shared secret). If Alice and Bob have an initial shared secret then they can use an unconditionally secure
Anshel–Anshel–Goldfeld key exchange (788 words) [view diff] exact match in snippet view article find links to article
elements can take variable quantities of space to represent). The computed shared secret is an element of the group, so in practice this scheme must be accompanied
Simple Certificate Enrollment Protocol (739 words) [view diff] exact match in snippet view article find links to article
provides the use of a shared secret, which should be client-specific and used only once. The confidentiality of the shared secret optionally used for source
Dining cryptographers problem (2,131 words) [view diff] exact match in snippet view article find links to article
honestly follow the protocol. Complexity The protocol requires pairwise shared secret keys between the participants, which may be problematic if there are
IMS security (2,601 words) [view diff] exact match in snippet view article find links to article
two authentication mechanisms. One is based on the possession of a shared secret between the communicating entities (GBA-Generic Bootstrapping Architecture)
Off-the-record messaging (1,886 words) [view diff] exact match in snippet view article find links to article
libotr. Instead of comparing key checksums, knowledge of an arbitrary shared secret can be utilised for which relatively low entropy can be tolerated. Version
Socialist millionaire problem (1,080 words) [view diff] exact match in snippet view article find links to article
parties to verify the identity of the remote party through the use of a shared secret, avoiding a man-in-the-middle attack without the inconvenience of manually
BB84 (978 words) [view diff] exact match in snippet view article find links to article
reconciliation and privacy amplification techniques to create some number of shared secret keys. Otherwise, they cancel and start over. SARG04 E91 – quantum cryptographic
IEEE 802.11i-2004 (1,540 words) [view diff] exact match in snippet view article find links to article
with the access point (AP). After the PSK or 802.1X authentication, a shared secret key is generated, called the Pairwise Master Key (PMK). In PSK authentication
End-to-end encryption (2,810 words) [view diff] exact match in snippet view article find links to article
hashes (fingerprints) based on the communicating users’ public keys or shared secret keys. The parties compare their fingerprints using an outside (out-of-band)
SARG04 (1,407 words) [view diff] exact match in snippet view article find links to article
and information reconciliation techniques to create some number of shared secret keys. Otherwise, they cancel and start over. The advantage of this scheme
SARG04 (1,407 words) [view diff] exact match in snippet view article find links to article
and information reconciliation techniques to create some number of shared secret keys. Otherwise, they cancel and start over. The advantage of this scheme
KYPS (242 words) [view diff] no match in snippet view article find links to article
 2191–2195. doi:10.1109/GLOCOM.2004.1378398. ISBN 0-7803-8794-5. Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy (KLASSP).
Transport Layer Security (17,117 words) [view diff] exact match in snippet view article find links to article
encryption are generated uniquely for each connection and are based on a shared secret that was negotiated at the start of the session. The server and client
Tim Bradstreet (1,195 words) [view diff] exact match in snippet view article find links to article
burn-out [...] evokes both the horrors of addiction and the intimacy of a shared secret. White Wolf, Steve Jackson, or Bradstreet himself ought to market it
TR-069 (2,043 words) [view diff] exact match in snippet view article find links to article
more problematic. The identity of the device is verified based on a shared secret (password) at the HTTP level. Passwords may be negotiated between the
CAVE-based authentication (612 words) [view diff] case mismatch in snippet view article find links to article
roaming partner to enable local authentication in the visited network. Shared Secret Data (SSD) – A 128-bit secondary secret key that is calculated using
Simple Protocol for Independent Computing Environments (840 words) [view diff] exact match in snippet view article find links to article
SPICE protocol defined a ticket based authentication scheme using a shared secret. The server would generate an RSA public/private keypair and send its
Cryptocat (1,618 words) [view diff] exact match in snippet view article find links to article
authenticated encryption, Curve25519 for Elliptic curve Diffie-Hellman shared secret agreement, HMAC-SHA256 for key derivation and Ed25519 for signing. In
8chan (5,789 words) [view diff] exact match in snippet view article find links to article
a Board Owner on 8chan, please email us at admin@8kun.net with your shared secret if you are interested in migrating your board to 8kun" (Tweet) – via
Rolling code (739 words) [view diff] exact match in snippet view article find links to article
in multi-factor authentication uses similar approach, but with pre-shared secret key and HMAC instead of PRNG and pre-shared random seed. A rolling code
Runes (6,930 words) [view diff] exact match in snippet view article find links to article
Middle Welsh cyfrin, Middle Breton queffrin, Middle Irish comrún 'shared secret, confidence') and Sacruna (< *sacro-runa 'sacred secret'), as well as
Information rights management (589 words) [view diff] exact match in snippet view article find links to article
sensitive information in such a situation. IRM is far more secure than shared secret passwords. Key management is used to protect the information whilst
Anya Corazon (4,343 words) [view diff] exact match in snippet view article find links to article
her father turned out to be a trap, the pair nonetheless bonded, and shared secret identities. Both she and Rikki join the superhero group Young Allies
Comparison of open-source configuration management software (3,430 words) [view diff] exact match in snippet view article find links to article
(2014-01-04). "PIKT Licensing". Pikt.org. Retrieved 2014-02-10. PIKT uses shared secret keys for mutual authentication. "As an option, you can use secret key
SBMV Protocol (494 words) [view diff] no match in snippet view article find links to article
emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states
Scott Baldwin (2,471 words) [view diff] exact match in snippet view article find links to article
Dr. Rick Webber, returned to town. Scott and Rick had some kind of shared secret, and Rick pulled strings to help Scott get elected to a position as
Ricky Kasso (2,244 words) [view diff] case mismatch in snippet view article find links to article
David Breskin (June 11, 1992) In Newsday (Long Island, New York): "A Shared Secret: Murder in Northport" by Thomas Maier and Rex Smith (August 12, 1984)
Ricky Kasso (2,244 words) [view diff] case mismatch in snippet view article find links to article
David Breskin (June 11, 1992) In Newsday (Long Island, New York): "A Shared Secret: Murder in Northport" by Thomas Maier and Rex Smith (August 12, 1984)
Certificate Management Protocol (637 words) [view diff] exact match in snippet view article find links to article
very important aspect of proof-of-origin in two formats: based on a shared secret (used initially) and signature-based (using pre-existing certificates)