A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Shared Secret

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A secret value that has been computed using a key-establishment scheme and is used as input to a (single-step) key derivation function or an extraction-then-expansion procedure that derives keying material in a two-step process.
Source(s):
NIST SP 800-133 under Shared secret [Superseded]

  A secret value that has been computed using a key agreement algorithm.
Source(s):
NIST SP 800-135 Rev. 1 under Shared secret

  A secret value that has been computed using a key-agreement scheme and is used as input to a key derivation method.
Source(s):
NIST SP 800-56A Rev. 2 under Shared secret [Superseded]

  A value generated during a public-key-based key establishment scheme defined in NIST SP 800-56A or SP 800-56B.
Source(s):
NIST SP 800-56C under Shared secret [Superseded]

  A secret value that has been computed using a key-agreement scheme and is used as input to a key-derivation function/method.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Shared secret [Superseded]
NIST SP 800-57 Part 1 Rev. 3 under Shared secret [Superseded]

  A secret used in authentication that is known to the subscriber and the verifier.
Source(s):
NIST SP 800-63-3

  A secret value that has been computed during the execution of a key-establishment scheme, is known by both participants, and is used as input to a key-derivation method to produce secret keying material.
Source(s):
NIST SP 800-56B Rev. 2 under Shared secret

  A secret value that has been computed during an execution of a key-establishment scheme between two parties, is known by both participants, and is used as input to a key-derivation method to produce keying material.
Source(s):
NIST SP 800-133 Rev.1 under Shared secret [Superseded]

  A secret value that is computed during a (pair-wise) key-agreement transaction and is used as input to derive a key using a key-derivation method.
Source(s):
NIST SP 800-175B Rev. 1 under Shared secret

  A secret value that has been computed using a key-agreement scheme and is used as input to a key-derivation method.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Shared secret

  A secret value that has been computed during a key-establishment scheme, is known by both participants, and is used as input to a key-derivation method to produce keying material.
Source(s):
NIST SP 800-56B Rev. 1 under Shared secret [Superseded]

  A secret used in authentication that is known to the Claimant and the Verifier.
Source(s):
NIST SP 800-63-2 [Superseded]