Answer Posted / ashutosh
it's a third party authentication protocol.....
a server is maintained which keep the key of the 2 parites,
keys are matched at the server which holds the
key...........
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Are certifying authorities susceptible to attack?
What is the NSA ?
What is SSH ?
What is the secure hash algorithm (sha and sha-1)?
How is cryptography applied ?
What is a hash function? What is a message digest?
What is feal?
What are interactive proofs and zero-knowledge proofs ?
Why is Clipper controversial?
What role does the NSA play in commercial cryptography?
What is PKCS ?
Has factoring been getting easier?
How are certificates used?
What are cryptography standards ?
At what point does an attack become practical ?