Shared Key Authentication

Why Trust Techopedia

What Does Shared Key Authentication Mean?

Shared key authentication (SKA) is a verification method in which a computer or terminal uses the Wired Equivalent Privacy (WEP) protocol to access a wireless network. It pre-establishes that a requesting system has knowledge of a shared secret key required for authentication.

Advertisements

The Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard assumes that the key is delivered to wireless clients using a secured channel that is independent of the standard. In practice, the user simply types in the password for the Wi-Fi network in order to gain access.

Techopedia Explains Shared Key Authentication

Shared key authentication (SKA) is not considered a secure method of granting network access because it uses conventional unsecured channels, like writing and verbal exchange, to share a security key for granting access.

Although the dissemination of the key is a large security issue, the authentication itself is secured using 64 or 128-bit encryption. It is difficult for an intruder to gain access without knowledge of the key.

SKA employs the following steps:

  1. The requesting wireless device/client sends an identity assertion and authentication request to the access point (AP).
  2. The access point challenges the client by sending a challenge text.
  3. Using WEP and an encryption key, which is derived from the secret shared key (password), the client encrypts the challenge text and sends it back to the AP.
  4. The AP decrypts the challenge text, and if it matches the one originally sent to the client, the authentication result is positive and the AP authenticates the client.
  5. The client successfully connects to the network.
Advertisements

Related Terms

Margaret Rouse
Technology expert
Margaret Rouse
Technology expert

Margaret is an award-winning writer and educator known for her ability to explain complex technical topics to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles in the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret’s idea of ​​a fun day is to help IT and business professionals to learn to speak each other’s highly specialized languages.