Unix

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Unix

Post by answerhappygod »

Unix
Unix 1
Unix 1 (49.72 KiB) Viewed 10 times
For the biometric authentication protocols illustrated in Figure 5.1 below (it is UNIX password [15%] scheme), note the biometric capture device is authenticated in the case of a static biometric but not authenticated for a dynamic biometric. Explain why authentication is useful in the case of a static biometric, but not needed in the case of a dynamic biometric. Client Host Host Client U. User U r. random number EO), function (r.E() r. random number x, random sequence challenge EO, function Ex. D'. BT) B.BSC Preturn of r k Br. BSW'))= EE.P.BT)- O.P.RT) (BSC) extract B if AND D-D from (r. BSC) AND BT-87(E) AND x-x then yes else no AND BU then yes else no U. User BBT biometric D' biometric device r. return of r yes/no Protocol for static biometric Figure 5.1 (r.x.E()) Er. BS(X) yes/no Protocol for dynamic biometric
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply