Question: Select the appropriate events in a simple challenge-response protocol from the following list and list them in the order of occurrence. a) The host authenticates
Select the appropriate events in a simple challenge-response protocol from the following list and list them in the order of occurrence.
a) The host authenticates the user if the quantities match, or rejects the user otherwise.
b) The host generates a random number r, and returns r to the user.
c) The user responds the quantity f(r, h(P)) back to the host, where r is the nonce, P is the users password.
d) The host generates a random number r, and returns r and the specification of two functions, h() and f(), to the user.
e) The host compares the incoming h(P) to h(P(U)), where h(P(U))is the locally stored hash value of user Us password.
f) The user responds the hash value h(r, P) back to the host, where r is the nonce, P is the users password.
g) The host compares the incoming h(r, P) to the calculated h(r, P(U)), where P(U) is the locally stored user Us password.
h) The user transmits his or her identity, U, to the remote host.
i) The host compares the incoming f(r, h(P)) to the calculated f(r, h(P(U))), where h(P(U))is the locally stored hash value of user Us password.
j) The user transmits his or her password, P, to the remote host.
k) The user transmits the hash value of his or her password, h(P), to the remote host.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
