The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
x
0 votes
120 views

asked in Computer Networks by (283 points) | 120 views
0

i think it's answer is option A

first, the challenge response authentication is basically a knowledge of secret value and you can connect it with a entity authentication. The simplest example of a challenge–response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.

the claimant(the claimant authenticates to a system or application over a network. The claimant had to be actually working when they claim.) proves that she knows a secret without actually sending it to the entity. 

1 Answer

+1 vote
option (A) is correct

In challenge response authentication the claimant proves that she knows the secret key without sending it or revealing it.

refer Forouzan for more details
answered by Active (2.9k points)

Related questions

0 votes
1 answer
1
asked Jul 9 in Computer Networks by pream sagar (283 points) | 112 views
0 votes
1 answer
2
asked Jul 9 in Computer Networks by pream sagar (283 points) | 117 views
0 votes
1 answer
3
asked 5 days ago in Others by Sanjay Sharma Boss (48.6k points) | 62 views


Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

36,995 questions
44,571 answers
126,782 comments
43,637 users