Challenge–response authentication is a family of protocols in which one party presents a question and the other must provide a valid answer to be authenticated. Password authentication is an example of this, where the challenge is asking for the password and the response is the correct password. U.S. military uses the AKAC-1553 TRIAD numeral cipher to authenticate and encrypt some communications, while more complex algorithms can also be used.
Stanford University
Winter 2023
This course offers an introduction to cryptographic techniques used in computer security, covering encryption, message integrity, digital signatures, key management, and more. It is suitable for advanced undergraduates and masters students with some proof techniques and programming experience.
No concepts data
+ 55 more concepts