dimanche 30 novembre 2014

Authentication protocol based on hash function



Is it possible that Alice can authenticate Bob without using encryption,hashing ONLY. If so, what is the best way to do that? I suggest a way using nonce and timestamp as shown in .the pic





Aucun commentaire:

Enregistrer un commentaire