End-to-End Authentication
Cryptography based
Challenge-response
response generated with encryption
challenge varies to defeat interception
Time synchronized
password depends on time of day
user-carried device generates password
good for system administrators
Previous slide
Next slide
Back to first slide
View graphic version