The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
x
0 votes
191 views

asked in Computer Networks by Junior (795 points) | 191 views
0

i think it's answer is option A

first, the challenge response authentication is basically a knowledge of secret value and you can connect it with a entity authentication. The simplest example of a challenge–response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.

the claimant(the claimant authenticates to a system or application over a network. The claimant had to be actually working when they claim.) proves that she knows a secret without actually sending it to the entity. 

1 Answer

+1 vote
option (A) is correct

In challenge response authentication the claimant proves that she knows the secret key without sending it or revealing it.

refer Forouzan for more details
answered by Active (3.7k points)

Related questions

0 votes
1 answer
1
asked Jul 9 in Computer Networks by pream sagar Junior (795 points) | 167 views
0 votes
1 answer
2
asked Jul 9 in Computer Networks by pream sagar Junior (795 points) | 160 views


Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

42,572 questions
48,561 answers
155,420 comments
63,581 users