Use this tag for questions about challenge-response authentication. Do NOT use it because the question is related to some programming challenge.
Questions tagged [challenge-response]
106 questions
13
votes
5 answers
How can one make a web-site accessible only when someone has a dongle?
Suppose you want to add an extra layer of credentials on top of a SSL-encrypted login/password, but you don't want to increase complexity to the user. Is there a way to add the requirement of the possession of a dongle to web-server authentication…

Brian M. Hunt
- 81,008
- 74
- 230
- 343
8
votes
2 answers
How does challenge-response protocol help against man-in-the-middle attacks?
How does challenge-response authentication prevent man-in-the-middle attacks? I read the wiki article but still I cannot understand.

user574183
- 710
- 1
- 10
- 22
6
votes
2 answers
Why time-based nonce should be avoided?
In challenge-response mechanism (and other systems), it advised not to use time-based nonce.
Why it should be avoided?

rick
- 1,009
- 2
- 10
- 28
6
votes
8 answers
Javascript function challenge add(1,2) and add(1)(2) both should return 3
A friend of mine challenged me to write a function that works with both of these scenarios
add(2,4) // 6
add(2)(4) // 6
My instinct was the write an add() function that returns itself but I'm not sure I'm heading in the right direction. This…

MicFin
- 2,431
- 4
- 32
- 59
5
votes
2 answers
How can I use Delphi to create a visual challenge / response for restoring access to an application?
I'm interested in creating a challenge / response type process in Delphi. The scenario is this...we have 2 computers...1 belongs to the user and 1 belongs to a support technician.
The user is locked out of a certain program, and in order to gain 1…

Mick
- 13,248
- 9
- 69
- 119
4
votes
2 answers
Double Cola Challenge, JavaScript code wrong?
Five friends are drinking magic cola in an line. When the first friend drinks the cola he disappears, and multiplies into two copies! After that, those new copies go to the end of the line and the next friend drinks the magic cola, repeating the…

Flame_Phoenix
- 16,489
- 37
- 131
- 266
4
votes
0 answers
Coding Challenge in Java: Given Letters and Returning What Rank They are in
Hey so for practice I found this coding challenge which I have now been working on for a few days. I have the first part, but I just can't seem to figure out how to continue from where I am. Here is the challenge:
Consider a "word" as any…

Kiley
- 409
- 1
- 5
- 19
4
votes
1 answer
Hackerrank.com tic tac toe challenge
I want to ask is it possible to win at tic tac toe challenge? Because the judgebot knows each and every trick and he knows how to fail the trick moves . I am only able to tie the game in both turns . If it is possible , can you guys please just give…

Sultan Ashfaq
- 55
- 5
3
votes
2 answers
How does the Socialist Millionaire Protocol differ from a simple Challenge-Response like CHAP?
this is a clueluess question, but what does the Socialist Millionaire Protocol, which is typically used in conjunction with OTR-Messaging, that "conventional" Challenge-Response Mechanisms like CHAP can't…

Fabian Zeindl
- 5,860
- 8
- 54
- 78
3
votes
1 answer
How to automate challenge-response authentication using Java
I have Linux phone with enabled SSH. I need to connect to it via challenge-response authentication. So how looks this process manually, for example, using PuTTY:
Connect to phone using IP and port.
Console shows "login as:" -> Enter user…

Svyat Pastukhov
- 33
- 3
3
votes
5 answers
How to make program quicker [Keypad_Sticky_Note]
Keypad Sticky Note
The minions have some of Professor Boolean's secrets safely locked away. Or so they think. In fact, they are so confident, they even have a password hint sticky note stuck to the keypad of the lock.
The lock requires you to enter…

rkatakam
- 51
- 6
3
votes
3 answers
How to add authentication to a (Python) twisted xmlrpc server
I am trying to add authentication to a xmlrpc server (which will be running on nodes of a P2P network) without using user:password@host as this will reveal the password to all attackers. The authentication is so to basically create a private…

bradleyjkemp
- 247
- 3
- 13
2
votes
1 answer
OAuth without browser and SSL / challenge-response model
We have a plan for developing a mobile application using REST-ful. We want to apply OAuth 1.0a not OAuth 2.0 because we don't use SSL. We also don't want to use web browser (we think PIN-based UX is not friendly). We know it's impossible with normal…

Kieran Dang
- 447
- 2
- 17
2
votes
1 answer
Add Additional Authentication Provider but keep current session data
I have a project in .NET5 MVC that had implemented Twitch authentication using AspNet.Security.OAuth.Twitch. I configured everything and it is working fine, but I want to add the option to link an additional account with other providers, like…

NioZero
- 87
- 2
- 11
2
votes
0 answers
ASP.NET Core Azure AD Challenge Authentication Properties - Set IsPersitent and ExpiresUtc
ISSUE
I would like to be able to set the properties (IsPersistent & ExpiresUtc) on the default challenge request for AzureAD login. I am not seeing how to do this, so that the user cookie that is created last longer than the browser session (closing…

Craig Selbert
- 737
- 1
- 8
- 17