Challenge–response authentication
Appearance
This article relies largely or entirely on a single source. (February 2019) |
In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.Cite error: A <ref>
tag is missing the closing </ref>
(see the help page).
See also
Wikibooks has a book on the topic of: Internet Technologies/Email spam
- Challenge-handshake authentication protocol
- CRAM-MD5
- Cryptographic hash function
- Cryptographic nonce
- Kerberos
- Otway–Rees protocol
- Needham–Schroeder protocol
- Wide Mouth Frog protocol
- Password-authenticated key agreement
- Salted Challenge Response Authentication Mechanism
- SQRL
- Distance-bounding protocol
- Reflection attack
- Replay attack
- Man-in-the-middle attack
- WebAuthn