Examples of using Shared secret in English and their translations into Russian
{-}
-
Colloquial
-
Official
Using a regular, symmetric cryptography, both parties need to know some"key" or"password"(called"shared secret").
exchanges keying material to establish the shared secret key, and authenticates computer identities.
Click OK. If a shared secret mismatch is suspected, type the secret
each recipient can find the"shared secret" encrypted with its own Public Key, decrypt it with its Private Key, and use the decrypted"shared secret" to decrypt the actual information.
so if someone breaks the"shared secret key" used for any transaction,
If you use a different shared secret for accounting, in Accounting, clear the Use the same shared secret for authentication
exchanging keying material to establish a shared secret key, and authenticating computer and user identities.
The bottom line is that asymmetric encryption allows for relatively secure encryption without the need of a shared secret key, yet the complex computational nature makes it unfeasible for large sets of data.
If you are changing the shared secret for a server that is running Network Policy Server(NPS) on which a central Remote Desktop connection authorization policy(RD CAP) is stored, keep in mind that you must use the same case-sensitive shared secret that you specified when configuring the RD Gateway server as a RADIUS client on the central server running NPS.
Generates and manages shared, secret keys that are used to secure the information.
They shared secrets.
They traveled together, shared secrets, hopes, dreams.
You shared secrets with Riario and put the entire city at peril!
Friends share secrets.
Sharing secrets will strengthen the bond between you two.
We're sharing secrets now!
We don't have to share secrets.
People anonymously sharing secrets.
Only the information required by the DH key determination algorithm to generate the shared, secret key is exchanged.
meet with friends, share secret, find out the latest news,