Describe the public key authentication process, assuming that the keys are all stored in the appropriate places.

What will be an ideal response?


With the keys stored in the appropriate places, the following occurs in the public key authentication process:
1. The client informs the server which public key is being used for authentication.
2. The server checks to see if the public key is known.
3. The server encrypts a random number using the public key and transfers this to the client.
4. Only the client is able to decrypt the random number with its private key.
5. The client sends the server an MD5 checksum that it has calculated from the number.
6. The server also calculates a checksum and, if they are identical, the user has authenticated successfully.
7. If public key authentication fails and password authentication is allowed, the user is asked for the login password.

Computer Science & Information Technology

You might also like to view...

A topological sort on an event graph can:

A. provide the vertices of the graph in order, according to some data member B. rearrange the events inside the graph so that they are in order, starting at the top C. do a kind of logical sorting on the vertices, where the vertices are sorted by meaning rather than by number D. provide the order in which events can be performed

Computer Science & Information Technology

Allowing for the maximum number of possible encryption mappings from the plaintext block is referred to by Feistel as the __________ . ?

A) ?ideal substitution cipher ? B) ?round function C) ?ideal block cipher ? D) ?diffusion cipher

Computer Science & Information Technology

Under what circumstances might a company justifiably charge a much higher price for a software system than the software cost estimate plus a reasonable profit margin?

What will be an ideal response?

Computer Science & Information Technology

What is the most likely reason for creating multiple front-end files linking to a single back-end database?

A) Create custom applications for users with different needs B) Disk space restrictions C) Password protection D) Better backup options

Computer Science & Information Technology