In key distribution and reciprocal authentication schemes two communicating parties cooperate by exchanging messages to distribute keys and/or authenticate each other. In many cases ___________ are used for handshaking to prevent replay attacks.
A. session keys
B. nonces
C. RC4s
D. entropies
B. nonces
Computer Science & Information Technology
You might also like to view...
Which is NOT a feature of security software?
A) Keystroke logging B) System and e-mail scans C) Parental controls D) Subscriptions
Computer Science & Information Technology
A built-in class that helps to split strings into pieces, such as words of a sentence, is:
a) Console b) Scanner c) StringBuffer d) StringTokenizer
Computer Science & Information Technology