How is a challenge-response protocol utilized with token implementations?

How is a challenge-response protocol utilized with token implementations?

How is a challenge-response protocol utilized with token implementations?

A.
They are not; cryptography is used.

B.
An authentication service generates a challenge, and the smart token generates aresponse based on the challenge.

C.
The token challenges the user for a username and password.

D.
The token challenges the users password against a database of storedcredentials.

Explanation:
An asynchronous token device is based on challenge-responsemechanisms. The authentication service sends the user a challenge value and the userenters this into the token. The token encrypts or hashes this value and the useruses this as her one-time password.



Leave a Reply 0

Your email address will not be published. Required fields are marked *