In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.Clearly an adversary who can eavesdrop on a password authentication can then authenticate itself in the same way. One solution is to issue multiple passwords, each of them marked with an identifier. For instance, p1=pv4OAFx1Q2cQ, p2=DsYfX3Ke, and so on.
Posts about Challenge-Response
  • How to Rid Your Blog of Comment Spam

    How to Rid Your Blog of Comment Spam September 25, 2014 - Posted by Chris Irby to Blogging It’s a pain that any blogger knows all too well. You get a notification that one of your blog posts has received a comment. Excited that someone was willing to take the time and energy to respond to your online brilliance, you click over eagerly to see what they had to say.

    Chris Irby/ Dex Media- 26 readers -
Get the top posts daily into your mailbox!