In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.Clearly an adversary who can eavesdrop on a password authentication can then authenticate itself in the same way. One solution is to issue multiple passwords, each of them marked with an identifier. For instance, p1=pv4OAFx1Q2cQ, p2=DsYfX3Ke, and so on.
Posts about Challenge-Response
  • How to Rid Your Blog of Comment Spam

    … who are overwhelmed with spam. However, there’s always the small chance you might be discarding a few legitimate comments along with the trash. CAPTCHAs: CAPTCHA stands for the rather unwieldy “Completely Automated Public Turing test to tell Computers and Humans Apart.” Basically, these programs use some kind of challenge-response test to make sure…

    Chris Irby/ Dex Mediain SEO Google Blogging How To's- 21 readers -
Get the top posts daily into your mailbox!