In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other. In many cases ___________ are used for handshaking to prevent replay attacks.

A. session keys
B. nonces
C. RC4s
D. entropies

B. nonces

Computer Science & Information Technology

You might also like to view...

Which is NOT a feature of security software?

A) Keystroke logging B) System and e-mail scans C) Parental controls D) Subscriptions

Computer Science & Information Technology

A built-in class that helps to split strings into pieces, such as words of a sentence, is:

a) Console b) Scanner c) StringBuffer d) StringTokenizer

Computer Science & Information Technology