next up previous
Next: Implementation of Authentication Up: Authentication Previous: A Challenge-Response Protocol with

Security of the Protocol

There are several points where the security of the authentication protocol can be attacked. We address each below:



Michael John Radwin
Thu May 8 10:49:26 EDT 1997