Ask Question
12 August, 15:20

Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key cryptography to authorize users. What type of solution is he seeking?

+5
Answers (1)
  1. 12 August, 15:38
    0
    Issac is seeking challenge response token type of solution.

    Explanation:

    Difficulty-response encryption is in computer security a group of protocols where one party raises a request ("Challenge") and then another group must send a valid answer ("Response"). User verification, the most basic example of a request-response protocol, is the task for the right user.

    Authentication of the Challenge response requires a cryptographic protocol to indicate that the recipient does not know the password by themselves. The result is then computed with the use of a cryptographic hash function in conjunction with the password of the recipient.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key ...” in 📗 Business if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers