Skip to main content

Questions tagged [psk]

1 vote
1 answer
284 views

I have build multiple embedded devices with TLS1.2/3 + PSK using mbedtls and wolfssl libraries. My products have been with microcontrollers(ESP32, Silicon labs, etc.) and OpenWRT based Linux products. ...
Prajosh Premdas's user avatar
1 vote
2 answers
164 views

It is very common (at least where I am) for routers to come with a WiFi-PSK on the bottom of the router. And I don’t mean something like Wifi-Link-2G, I mean something random and (cryptographically) ...
security_paranoid's user avatar
1 vote
0 answers
104 views

Before you see this as a “duplicate,” this question is similar, but the circumstances of mine are very different. My scenario is purely hypothetical, but could definitely apply to people in real life. ...
security_paranoid's user avatar
1 vote
1 answer
2k views

"The KeyUpdate handshake message is used to indicate that the sender is updating its sending cryptographic keys." "If the request_update field is set to "update_requested", ...
hjhjh's user avatar
  • 51
1 vote
1 answer
260 views

I am having a Handshake session of PSK_only mode in TLS1.3 , where I use PSK's established out of band. consider, client Hello is sent with the extensions of supported_versions, PreSharedKey, ...
hjhjh's user avatar
  • 51
0 votes
1 answer
277 views

I am doing testing with some ethernet device, for which I use an own TLS implementation (using OpenSSL for the actual cryptographic functions). There are pre shared keys used. When I am connecting to ...
seesharp's user avatar
1 vote
2 answers
176 views

I'm looking for a standard solution to the following problem. I've been unable to find how something like this is normally accomplished. Even a key word that points me in the right direction would be ...
Joseph Rappaport's user avatar
1 vote
1 answer
1k views

TLS 1.2 session tickets are encrypted by the server with the session ticket encryption key (STEK). This key is shared with all the servers doing TLS termination. The session ticket contains all the ...
user2233706's user avatar
1 vote
3 answers
713 views

Pre-Shared Key (PSK) with simple symmetric encryption is a popular way of solving both client and server authentication when SSL cannot be used for some reason (for example, can't trust or deal with ...
personal_cloud's user avatar
2 votes
1 answer
414 views

EAP-TLS with TLS 1.3 is standardized in RFC 9190. Section 2.1.1 specifies Authentication. The RFC states that PSK authentication shall not be used except for resumption. This is surprising, because ...
Mark Thomas's user avatar
4 votes
3 answers
4k views

TLS 1.3 removes the use of non-ephemeral Diffie-Hellman, which is great! But it still allows PSK. I'm not as familiar with PSK configuration but wouldn't that mean TLS 1.3 still is allowing the use of ...
HeadphoneHaxZ's user avatar
0 votes
1 answer
689 views

I was looking for ways to make Wi-Fi that uses WPA2-Personal/WPA-PSK secure, and I stumbled in this answer (the second one, from Terrence Koeman): WPA2-PSK (aka WPA2 Personal) basically does the same ...
re.sole's user avatar
2 votes
2 answers
2k views

I've read that pre-shared keys (PSKs) are symmetric keys shared in advance among communicating parties but have found no explanation as to how the TLS client and server agree upon the value of the PSK....
Michael's user avatar
  • 23
1 vote
0 answers
467 views

I have an unidentified PSK encryption in airodump's output (see red square on screenshot) and I would like to get more information about the encryption method used by the network: do you know any tool ...
John Kravicz's user avatar
4 votes
1 answer
7k views

I'm trying to create a connection between an openssl server and client on my machine using ECDHE-PSK-AES256-CBC-SHA384 What am I doing wrong with these commands? openssl s_server -cipher ECDHE-PSK-...
Philippe's user avatar
  • 215

15 30 50 per page