Security keys utilize a secure challenge-and-response authentication system, which is based on ________.
Answers
Answered by
0
Answer:
security keys utilize a secure challenge and response authentication system, which is based on security
Answered by
4
"Public key cryptography" is the correct answer for the above question.
Explanation:
- The cryptography is used to encrypt the message so that the unauthorized use or hackers can not hack the message.
- It is of two types of private key and public-key cryptography, in which public-key cryptography is used to encrypt the message with the help of two key.
- One key is used to encrypt the message which is known as the public key and the other is used to decrypt the message known as a private key.
- This type of cryptography is used to secure the message and it is also used for the authentication system.
- The above question asked about the challenges, which is used to secure the message and the data. This is known as public-key cryptography, which is described above.
Learn More:
- Cryptography : https://brainly.in/question/8987766
Similar questions