The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
x
0 votes
161 views

asked in Computer Networks by (495 points) | 161 views
0

i think it's answer is option A

first, the challenge response authentication is basically a knowledge of secret value and you can connect it with a entity authentication. The simplest example of a challenge–response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.

the claimant(the claimant authenticates to a system or application over a network. The claimant had to be actually working when they claim.) proves that she knows a secret without actually sending it to the entity. 

1 Answer

+1 vote
option (A) is correct

In challenge response authentication the claimant proves that she knows the secret key without sending it or revealing it.

refer Forouzan for more details
answered by Active (3.4k points)


Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

39,437 questions
46,622 answers
139,335 comments
56,999 users