Describe the public key authentication process, assuming that the keys are all stored in the appropriate places.
What will be an ideal response?
With the keys stored in the appropriate places, the following occurs in the public key authentication process:
1. The client informs the server which public key is being used for authentication.
2. The server checks to see if the public key is known.
3. The server encrypts a random number using the public key and transfers this to the client.
4. Only the client is able to decrypt the random number with its private key.
5. The client sends the server an MD5 checksum that it has calculated from the number.
6. The server also calculates a checksum and, if they are identical, the user has authenticated successfully.
7. If public key authentication fails and password authentication is allowed, the user is asked for the login password.
You might also like to view...
Which of the following must be true when making a method call?
a) The number of arguments in the method call must match the number of parameters in the method header. b) The argument types must be compatible with their corresponding parameter types. c) Both a and b. d) None of the above.
How many bits does WEP encryption use to scramble data packets?
A. 20 B. 30 C. 40 D. 50