A-Z Popular New Security Search »
Information Security
 
Related Guides

Password vs Key

 , updated on
A password is a user created secret phrase that is used to verify identity or generate cryptographic keys.
A key is data that is used to lock and unlock cryptographic functions such as encryption, authentication and authorization.

Password vs Key

Keys are created by algorithms that are designed to make them difficult to guess. They are typically based on random or pseudorandom data.
Passwords aren't as secure as keys as they are created by users. Users commonly use dictionary words and other patterns in passwords that make them easier to guess than keys.
Passwords are also designed to be remembered and are often shorter than keys. For example, an ascii password of 12 characters can be stored in 96 bits. Keys are commonly 128 bits or longer.

Password to Key

Passwords that are used for encryption are typically converted to a key first using a type of algorithm known as a key derivation function. For example, a cryptographic hash function may be used to create keys from passwords.
Password vs Key
Password
Key
Definition
A user created secret phrase.
A system created phrase used to lock and unlock cryptographic functions.
Used In
Encryption
Authentication
Encryption
Authentication
Authorization
Digital Certificates
Secure Communication
Non-repudiation
Randomness
May contain non-random data such as dictionary words.
Often close to random.

Encryption

This is the complete list of articles we have written about encryption.
Cleartext
Cryptography
Hashcode
Key Stretching
Keys
Nonce
Pepper
Private Key
Random Seed
Salt
Plaintext
Pseudorandom
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Cryptography

A list of cryptography concepts.

Hashcode

An overview of hashcodes.

Pseudorandom vs Random

The difference between a pseudorandom and true random number.

Cryptographic Keys

Definitions of common types of cryptographic key.

Digital Watermark

A definition of digital watermark with examples.

Network Security

An extensive list of network security techniques.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map