COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which authentication protocol uses a timestamp to assure the session key has just been generated?
A
Needham-Schroeder protocol
B
Symmetric encryption protocol
C
Mutual authentication protocol
D
Denning protocol
Explanation: 

Detailed explanation-1: -Note also that even without this option the Kerberos protocol only uses timestamps to assure the freshness of the initial message from the client to the end-server. The protocol uses a more traditional nonce to assure the freshness of the response from the authentication server and for mutual authentication.

Detailed explanation-2: -The Time-Stamp Protocol, or TSP is a cryptographic protocol for certifying timestamps using X. 509 certificates and public key infrastructure. The timestamp is the signer’s assertion that a piece of electronic data existed at or before a particular time.

Detailed explanation-3: -Transport Level Security (TLS) is an authentication protocol that uses public-key encryption. All messages between the client and server are securely encrypted.

Detailed explanation-4: -Challenge-Handshake Authentication Protocol (CHAP): This system reauthenticates users periodically, even within the same session. Each challenge is different from the last version. DIAMETER: This protocol provides a framework for authentication and accounting messages.

There is 1 question to complete.