International Electrotechnical Commission
Glossary

ENChallenge-Response, Challenge-Response Protocol 
1. An authentication process that verifies an identity by requiring correct authentication information to be provided in response to a challenge. In a computer system, the authentication information is usually a value that is required to be computed in response to an unpredictable challenge value.

(Source: RFC 2828)

2. An authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a shared secret (often by hashing the challenge and secret together) to generate a response that is sent to the verifier. The verifier knows the shared secret and can independently compute the response and compare it with the response generated by the claimant. If the two are the same, the claimant is considered to have successfully authenticated himself. When the shared secret is a cryptographic key, such protocols are generally secure against eavesdroppers. When the shared secret is a password, an eavesdropper does not directly intercept the password itself, but the eavesdropper may be able to find the password with an off-line password guessing attack.

(Source: NIST SP 800-63)


TC/SC:57Terms     Info     Publications
Published in:IEC 62351-2, ed. 1.0 (2008-08) Terms     Info
Reference number:2.2.43
Source:RFC 2828, NIST SP 800-63

© Copyright 2024 IEC, Geneva, Switzerland. All rights reserved