secret key


Also found in: Dictionary, Acronyms, Wikipedia.
Related to secret key: secret key cryptography

secret key

An encryption key that is kept concealed. Its discovery voids the security of the encryption session. A secret key generally refers to the key in a secret-key cryptography system, in which both sides use the same key. It may also refer to the private key in a public key cryptography system, because the private key must also be kept "secret." See secret-key cryptography and public key cryptography.
References in periodicals archive ?
The app scans a QR code containing the secret key and then transmits that secret key to the Protectimus Slim NFC token.
Suppose a ciphertext matrix C encrypt m under the secret key s.
The squashing technique is very essential as the purpose is to remove the growing noise in the ciphertext without revealing any information about the plaintext or the secret key to the processor.
The KSA takes a secret key k with a 128 n-bit long word in the first step; the state tables are filled by numbers from 0 to N-1 and then substituted by S-box.
In the instance, the server can not produce a correct ciphertext of keywords without the secret key of sender.
Length of Limited Limited unlimited secret key Traceability of Yes Yes(for weak Not secret key (Strong) secret key) Resist minimal Not Not (weakly) Yes perturbation Integrity Not Yes Yes Confidentiality Yes (but Yes (but Yes vulnerable) vulnerable) Resist to weak Not Not Yes secret key Correlation Yes Yes (for weak Not between input secret key) and output Computational Weak Strong Middle power Attack proved Exist Exist Not exist Errors Not Yes (CBC) Not propagation
Only when the secret key has been loaded will the microprocessor unit inside execute the programme loaded on its memory," he added.
Wallace (2010) considered the non coherent reaches of secret key simultaneousness with open exchange over free indistinctly passed on Rayleigh obscuring remote channels, where neither the sender nor the recipients have section to quick channel state information (CSI).
* KeyGen (MK, S) [right arrow] S[K.sub.S:] The key generation takes as input master key MK and a set of attributes S and outputs S[K.sup.S] the secret key associated with S.
The implementation of the A5/1 stream cipher follows the basic process of a stream cipher that involves an initialization vector (IV) or seed, along with a secret key Ki to generate a sequence of bit streams which is the cipher.
Step 2: (Extract): For given user identification ID [member of] [{0,1}.sup.*], the PKG calculates the public key QID = [H.sub.1](ID) and secret key SID = [s.sup.*]QID.