Question: Consider the following authentication protocol based on a cryptographic hash H. The server stores z = H (w), where w is the user's password. To

 Consider the following authentication protocol based on a cryptographic hash H.

Consider the following authentication protocol based on a cryptographic hash H. The server stores z = H (w), where w is the user's password. To log on, the user enters his password w. The server sends a random value r, and the client responds with h = H (H (w), r). The server accepts the user if h = H (z, r). Is this authentication scheme secure against both eavesdropping and server compromise? Why

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!