From the course: IT Security Foundations: Core Concepts

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Sharing a secret

Sharing a secret

- [Instructor] One of the ways to protect your wireless traffic from prying eyes is to use a pre-shared key. When using a pre-shared key, all authorized entities share the same key, which can be a password or passphrase. We then use the key to encrypt the data. Let's talk about how this works. Encryption scrambles data by using a key which makes data unreadable to unauthorized individuals. When using a shared secret, both parties must have the same key to encrypt or decrypt data. So here we see that both entities have the same key, and on the left there's a plain text document. Using the shared key, we can encrypt it and then send it to the other party. On the other side, they can then decrypt the document and read the contents. But the important thing is that all entities must keep the shared secret from everyone else. Now, we're able to use encryption when setting up your home router. Wireless communications use…

Contents