Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Challenge–response_authentication> ?p ?o. }
Showing items 1 to 18 of
18
with 100 items per page.
- Challenge–response_authentication abstract "In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.Clearly an adversary who can eavesdrop on a password authentication can then authenticate itself in the same way. One solution is to issue multiple passwords, each of them marked with an identifier. For instance, p1=pv4OAFx1Q2cQ, p2=DsYfX3Ke, and so on. The verifier can ask for any of the passwords, and the prover must have that correct password for that identifier. Assuming that the passwords are chosen independently, an adversary who intercepts one challenge-response message pair has no clues to help with a different challenge at a different time.For example, when other communications security methods are unavailable, the U.S. military uses the AKAC-1553 TRIAD numeral cipher to authenticate and encrypt some communications. TRIAD includes a list of three-letter challenge codes, which the verifier is supposed to choose randomly from, and random three-letter responses to them. For added security, each set of codes is only valid for a particular time period which is ordinarily 24 hours.Software in the 1980s and 1990s often used a similar method for copy protection: challenges would be questions like "What is the second word in the third paragraph on page 418 of the manual?". The security assumption was that copying the manual was more difficult than copying the software disk. Sometimes the manual would be printed in such a way that contemporary photocopy machines couldn't duplicate the pages.".
- Challenge–response_authentication wikiPageID "412627".
- Challenge–response_authentication wikiPageRevisionID "597567169".
- Challenge–response_authentication subject Category:Cryptographic_protocols.
- Challenge–response_authentication comment "In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.Clearly an adversary who can eavesdrop on a password authentication can then authenticate itself in the same way. ".
- Challenge–response_authentication label "Challenge response-authenticatie".
- Challenge–response_authentication label "Challenge-Response-Authentifizierung".
- Challenge–response_authentication label "Challenge–response authentication".
- Challenge–response_authentication label "Protocolos desafío-respuesta".
- Challenge–response_authentication label "Вызов-ответ (аутентификация)".
- Challenge–response_authentication sameAs Challenge%E2%80%93response_authentication.
- Challenge–response_authentication sameAs Challenge-response.
- Challenge–response_authentication sameAs Challenge-Response-Authentifizierung.
- Challenge–response_authentication sameAs Protocolos_desafío-respuesta.
- Challenge–response_authentication sameAs Challenge_response-authenticatie.
- Challenge–response_authentication sameAs Q1059963.
- Challenge–response_authentication sameAs Q1059963.
- Challenge–response_authentication wasDerivedFrom Challenge–response_authentication?oldid=597567169.