Q. Challenge-response authentication can be done using ________. (Solved)
1. symmetric-key ciphers
2. asymmetric-key ciphers
3. keyed-hash functions
4. all of the above
- d. all of the above
1. symmetric-key ciphers
2. asymmetric-key ciphers
3. keyed-hash functions
4. all of the above