Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Select the false statement. A reflection attack on a challenge-response protocol can be prevented by...
... using strong enough cryptographic transformations f(K,N) for the response computations.
... asking both sides to use different keys for authentication.
... requesting the initiator to prove identity first.
... asking both sides to use different challenges.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!