-
1 shared name
"A name that consists of an assembly's identity-its simple text name, version number, and culture information (if provided)-strengthened by a public key and a digital signature generated over the assembly. Because the assembly manifest contains file hashes for all the files that constitute the assembly implementation, it is sufficient to generate the digital signature over just the one file in the assembly that contains the assembly manifest. Assemblies with the same strong name are expected to be identical." -
2 secret key
"A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key." -
3 Internet Key Exchange
A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec). -
4 Wired Equivalent Privacy
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options." -
5 WEP
"An encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options."
См. также в других словарях:
Pre-shared key — In cryptography, a pre shared key or PSK is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used. Such systems almost always use symmetric key cryptographic algorithms. The… … Wikipedia
Pre-Shared Key — Mit Pre Shared Key ( vorher vereinbarter Schlüssel ) oder kurz PSK bezeichnet man solche Verschlüsselungsverfahren, bei denen die Schlüssel vor der Kommunikation beiden Teilnehmern bekannt sein müssen, also symmetrische Verfahren. PSK… … Deutsch Wikipedia
Pre-shared key — Mit Pre Shared Key ( vorher vereinbarter Schlüssel ) oder kurz PSK bezeichnet man solche Verschlüsselungsverfahren, bei denen die Schlüssel vor der Kommunikation beiden Teilnehmern bekannt sein müssen, also symmetrische Verfahren. PSK… … Deutsch Wikipedia
Key generation — is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted.Modern cryptographic systems include symmetric key algorithms (such as DES and AES) and public key algorithms… … Wikipedia
Key distribution in wireless sensor networks — Key distribution is an important issue in WSN design. It is a newly developing field due to the recent improvements in wireless communications.Wireless sensor networks are networks of small, battery powered, memory constraint devices named sensor … Wikipedia
pre-shared key — noun A TKIP passphrase used to protect your network traffic in WPA. A mechanism in Wi Fi Protected Access (WPA) Personal that allows the use of manually entered keys or passwords to initiate WPA security. The PSK is entered on the access point or … Wiktionary
Shared secret — In cryptography, a shared secret is a piece of data only known to the parties involved in a secure communication. The shared secret can be a password, a passphrase, a big number or an array of randomly chosen bytes.The shared secret is either… … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Shared services — refers to the provision of a service by one part of an organization or group where that service had previously been found in more than one part of the organization or group. Thus the funding and resourcing of the service is shared and the… … Wikipedia
Key MBTA bus routes — Key bus routes in the Massachusetts Bay Transportation Authority (MBTA) system have high ridership and higher frequency standards than other bus lines. [http://www.mbta.com/uploadedFiles/About the T/T Projects/T Projects… … Wikipedia
Key telephone system — A key system or key telephone system is a multiline telephone system typically used in small office environments.Key systems are noted for their expandability and having individual line selection buttons for each connected phone line, however… … Wikipedia