The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
0 votes

asked in Computer Networks by Active (1.7k points) | 254 views

i think it's answer is option A

first, the challenge response authentication is basically a knowledge of secret value and you can connect it with a entity authentication. The simplest example of a challenge–response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.

the claimant(the claimant authenticates to a system or application over a network. The claimant had to be actually working when they claim.) proves that she knows a secret without actually sending it to the entity. 

1 Answer

+1 vote
option (A) is correct

In challenge response authentication the claimant proves that she knows the secret key without sending it or revealing it.

refer Forouzan for more details
answered by Active (3.9k points)

Related questions

0 votes
1 answer
asked Jul 9, 2018 in Computer Networks by pream sagar Active (1.7k points) | 191 views
0 votes
1 answer
asked Jul 9, 2018 in Computer Networks by pream sagar Active (1.7k points) | 206 views
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
47,894 questions
52,260 answers
67,678 users