Challenge-response using (keyed) one-way functions – Entity Authentication
5.5.3 Challenge-response using (keyed) one-way functions The second option in a symmetric challenge-response protocol is to use one-way or hash functions to compute the responses. The shared secret K is hashed together with the random challenge RAND (see Figure 5.8). How this is done will be discussed in detail in Chapter 11, Hash Functions and…