Challenge-response protocols
Prove possession of a secret key without revealing that key on an open channel
Handy for computer logins, cellular phone accesses, etc
Previous slide
Next slide
Back to first slide
View graphic version