135k views
3 votes
Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key cryptography to authorize users. What type of solution is he seeking?

User Hiroshi
by
8.2k points

1 Answer

3 votes

Issac is seeking challenge response token type of solution.

Step-by-step explanation:

Difficulty-response encryption is in computer security a group of protocols where one party raises a request ("Challenge") and then another group must send a valid answer ("Response"). User verification, the most basic example of a request-response protocol, is the task for the right user.

Authentication of the Challenge response requires a cryptographic protocol to indicate that the recipient does not know the password by themselves. The result is then computed with the use of a cryptographic hash function in conjunction with the password of the recipient.

User Robert Green MBA
by
8.6k points
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.