Question: Consider the following authentication protocol based on a cryptographic hash H. The server stores z = H (w), where w is the user's password. To

Consider the following authentication protocol based on a cryptographic hash H. The server stores z = H (w), where w is the user's password. To log on, the user enters his password w. The server sends a random value r, and the client responds with h = H (H (w), r). The server accepts the user if h = H (z, r). Is this authentication scheme secure against both eavesdropping and server compromise? Why
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
