contestada

Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key cryptography to authorize users. What type of solution is he seeking?

Respuesta :

Issac is seeking challenge response token type of solution.

Explanation:

Difficulty-response encryption is in computer security a group of protocols where one party raises a request ("Challenge") and then another group must send a valid answer ("Response"). User verification, the most basic example of a request-response protocol, is the task for the right user.

Authentication of the Challenge response requires a cryptographic protocol to indicate that the recipient does not know the password by themselves. The result is then computed with the use of a cryptographic hash function in conjunction with the password of the recipient.