U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Shared Secret

Definition(s):

  A secret value that has been computed using a key-establishment scheme and is used as input to a (single-step) key derivation function or an extraction-then-expansion procedure that derives keying material in a two-step process.
Source(s):
NIST SP 800-133 [Superseded] under Shared secret

  A secret value that has been computed using a key agreement algorithm.
Source(s):
NIST SP 800-135 Rev. 1 under Shared secret

  A secret value that has been computed using a key-agreement scheme and is used as input to a key derivation method.
Source(s):
NIST SP 800-56A Rev. 2 [Superseded] under Shared secret

  A value generated during a public-key-based key establishment scheme defined in NIST SP 800-56A or SP 800-56B.
Source(s):
NIST SP 800-56C [Superseded] under Shared secret

  A secret value that has been computed using a key-agreement scheme and is used as input to a key-derivation function/method.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Shared secret
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Shared secret

  A secret used in authentication that is known to the subscriber and the verifier.
Source(s):
NIST SP 800-63-3

  A secret value that has been computed during the execution of a key-establishment scheme, is known by both participants, and is used as input to a key-derivation method to produce secret keying material.
Source(s):
NIST SP 800-56B Rev. 2 under Shared secret

  A secret value that has been computed during an execution of a key-establishment scheme between two parties, is known by both participants, and is used as input to a key-derivation method to produce keying material.
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Shared secret
NIST SP 800-133 Rev. 2 under Shared secret

  A secret value that is computed during a (pair-wise) key-agreement transaction and is used as input to derive a key using a key-derivation method.
Source(s):
NIST SP 800-175B Rev. 1 under Shared secret

  A secret value that has been computed using a key-agreement scheme and is used as input to a key-derivation method.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Shared secret

  A secret value that has been computed during a key-establishment scheme, is known by both participants, and is used as input to a key-derivation method to produce keying material.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Shared secret

  A secret used in authentication that is known to the Claimant and the Verifier.
Source(s):
NIST SP 800-63-2 [Superseded]