Explain Shared Key Authentication Steps