Select the appropriate events in a simple challenge-response protocol from the f
ID: 3585485 • Letter: S
Question
Select the appropriate events in a simple challenge-response protocol from the following list and list them in the order of occurrence.
a) The host authenticates the user if the quantities match, or rejects the user otherwise.
b) The host generates a random number r, and returns r to the user.
c) The user responds the quantity f(r, h(P)) back to the host, where r is the nonce, P is the user’s password.
d) The host generates a random number r, and returns r and the specification of two functions, h() and f(), to the user.
e) The host compares the incoming h(P) to h(P(U)), where h(P(U))is the locally stored hash value of user U’s password.
f) The user responds the hash value h(r, P) back to the host, where r is the nonce, P is the user’s password.
g) The host compares the incoming h(r, P) to the calculated h(r, P(U)), where P(U) is the locally stored user U’s password.
h) The user transmits his or her identity, U, to the remote host.
i) The host compares the incoming f(r, h(P)) to the calculated f(r, h(P(U))), where h(P(U))is the locally stored hash value of user U’s password.
j) The user transmits his or her password, P, to the remote host.
k) The user transmits the hash value of his or her password, h(P), to the remote host.
Explanation / Answer
the answering part isn't complete. Require some more time to edit it. please don't review
h) The user transmits his or her identity, U, to the remote host.
b) The host generates a random number r, and returns r to the user.
j) The user transmits his or her password, P, to the remote host.
g) The host compares the incoming h(r, P) to the calculated h(r, P(U)), where P(U) is the locally stored user U’s password.
d) The host generates a random number r, and returns r and the specification of two functions, h() and f(), to the user.
c) The user responds the quantity f(r, h(P)) back to the host, where r is the nonce, P is the user’s password.
i) The host compares the incoming f(r, h(P)) to the calculated f(r, h(P(U))), where h(P(U))is the locally stored hash value of user U’s password.
k) The user transmits the hash value of his or her password, h(P), to the remote host.
e) The host compares the incoming h(P) to h(P(U)), where h(P(U))is the locally stored hash value of user U’s password.
a) The host authenticates the user if the quantities match, or rejects the user otherwise.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.