Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Select the appropriate events in a simple challenge-response protocol from the f

ID: 3585485 • Letter: S

Question

Select the appropriate events in a simple challenge-response protocol from the following list and list them in the order of occurrence.

a) The host authenticates the user if the quantities match, or rejects the user otherwise.

b) The host generates a random number r, and returns r to the user.

c) The user responds the quantity f(r, h(P)) back to the host, where r is the nonce, P is the user’s password.

d) The host generates a random number r, and returns r and the specification of two functions, h() and f(), to the user.

e) The host compares the incoming h(P) to h(P(U)), where h(P(U))is the locally stored hash value of user U’s password.

f) The user responds the hash value h(r, P) back to the host, where r is the nonce, P is the user’s password.

g) The host compares the incoming h(r, P) to the calculated h(r, P(U)), where P(U) is the locally stored user U’s password.

h) The user transmits his or her identity, U, to the remote host.

i) The host compares the incoming f(r, h(P)) to the calculated f(r, h(P(U))), where h(P(U))is the locally stored hash value of user U’s password.

j) The user transmits his or her password, P, to the remote host.

k) The user transmits the hash value of his or her password, h(P), to the remote host.

Explanation / Answer

the answering part isn't complete. Require some more time to edit it. please don't review

h) The user transmits his or her identity, U, to the remote host.

b) The host generates a random number r, and returns r to the user.

j) The user transmits his or her password, P, to the remote host.

g) The host compares the incoming h(r, P) to the calculated h(r, P(U)), where P(U) is the locally stored user U’s password.

d) The host generates a random number r, and returns r and the specification of two functions, h() and f(), to the user.

c) The user responds the quantity f(r, h(P)) back to the host, where r is the nonce, P is the user’s password.

i) The host compares the incoming f(r, h(P)) to the calculated f(r, h(P(U))), where h(P(U))is the locally stored hash value of user U’s password.

k) The user transmits the hash value of his or her password, h(P), to the remote host.

e) The host compares the incoming h(P) to h(P(U)), where h(P(U))is the locally stored hash value of user U’s password.

a) The host authenticates the user if the quantities match, or rejects the user otherwise.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote