samedi 6 décembre 2014

Authentication protocol based on hash function [on hold]



Is it possible that Alice can authenticate Bob without using any secret information except her password, i.e they don't share any thing else. If so, how can I authenticate Alice and ensure the integrity and confidentiality of the password in the same time. is hashing useful in this case? if so can I use two way hash function since I know it is one way function.


I suggest a way using nonce and timestamp as shown in .the pic





Aucun commentaire:

Enregistrer un commentaire