...
Computer-Networks
August 29, 2024
Computer-Networks
August 29, 2024
Computer-Networks
August 29, 2024
Computer-Networks
August 29, 2024

Computer-Networks

Question 386

In____authentication, the claimant proves that she knows the secret without sending it to the verifier.

A
Asymmetric
B
Zero knowledge
C
Symmetric
D
Challenge response
Question 386 Explanation: 
In password authentication ,the claimant proves her identity by demonstrating that she knows the secret, the password.However, because the claimant reveals this secret , it is susceptible to interception by the adversary.In challenge response authentication , the claimant proves that she knows the secret without sending it. In other words the claimant does not send the secret to the verifier, the verifier either has it or finds it.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.

Correct Answer: D
Question 386 Explanation: 
In password authentication ,the claimant proves her identity by demonstrating that she knows the secret, the password.However, because the claimant reveals this secret , it is susceptible to interception by the adversary.In challenge response authentication , the claimant proves that she knows the secret without sending it. In other words the claimant does not send the secret to the verifier, the verifier either has it or finds it.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.

0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
error: Alert: Content selection is disabled!!