Computer Science, asked by munishchopra7413, 11 months ago

Security keys utilize a secure challenge-and-response authentication system, which is based on ________.

Answers

Answered by aradhana9595
0

Answer:

security keys utilize a secure challenge and response authentication system, which is based on security

Answered by AskewTronics
4

"Public key cryptography" is the correct answer for the above question.

Explanation:

  • The cryptography is used to encrypt the message so that the unauthorized use or hackers can not hack the message.
  • It is of two types of private key and public-key cryptography, in which public-key cryptography is used to encrypt the message with the help of two key.
  • One key is used to encrypt the message which is known as the public key and the other is used to decrypt the message known as a private key.
  • This type of cryptography is used to secure the message and it is also used for the authentication system.
  • The above question asked about the challenges, which is used to secure the message and the data. This is known as public-key cryptography, which is described above.

Learn More:

  • Cryptography : https://brainly.in/question/8987766

Similar questions