From the course: IT Security Foundations: Core Concepts
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Sharing a secret
From the course: IT Security Foundations: Core Concepts
Sharing a secret
- [Instructor] One of the ways to protect your wireless traffic from prying eyes is to use a pre-shared key. When using a pre-shared key, all authorized entities share the same key, which can be a password or passphrase. We then use the key to encrypt the data. Let's talk about how this works. Encryption scrambles data by using a key which makes data unreadable to unauthorized individuals. When using a shared secret, both parties must have the same key to encrypt or decrypt data. So here we see that both entities have the same key, and on the left there's a plain text document. Using the shared key, we can encrypt it and then send it to the other party. On the other side, they can then decrypt the document and read the contents. But the important thing is that all entities must keep the shared secret from everyone else. Now, we're able to use encryption when setting up your home router. Wireless communications use…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.