135k views
3 votes
Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key cryptography to authorize users. What type of solution is he seeking?

User Hiroshi
by
4.3k points

1 Answer

3 votes

Issac is seeking challenge response token type of solution.

Step-by-step explanation:

Difficulty-response encryption is in computer security a group of protocols where one party raises a request ("Challenge") and then another group must send a valid answer ("Response"). User verification, the most basic example of a request-response protocol, is the task for the right user.

Authentication of the Challenge response requires a cryptographic protocol to indicate that the recipient does not know the password by themselves. The result is then computed with the use of a cryptographic hash function in conjunction with the password of the recipient.

User Robert Green MBA
by
4.9k points