Computer-Networks
August 29, 2024Computer-Networks
August 29, 2024Computer-Networks
|
Question 386
|
In____authentication, the claimant proves that she knows the secret without sending it to the verifier.
|
Asymmetric
|
|
|
Zero knowledge
|
|
|
Symmetric
|
|
|
Challenge response
|
Question 386 Explanation:
In password authentication ,the claimant proves her identity by demonstrating that she knows the secret, the password.However, because the claimant reveals this secret , it is susceptible to interception by the adversary.In challenge response authentication , the claimant proves that she knows the secret without sending it. In other words the claimant does not send the secret to the verifier, the verifier either has it or finds it.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.
Correct Answer: D
Question 386 Explanation:
In password authentication ,the claimant proves her identity by demonstrating that she knows the secret, the password.However, because the claimant reveals this secret , it is susceptible to interception by the adversary.In challenge response authentication , the claimant proves that she knows the secret without sending it. In other words the claimant does not send the secret to the verifier, the verifier either has it or finds it.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.
In challenge response authentication, the claimant proves that she knows the secret without sending it to the verifier.
