security, cryptography: ridiculous plea - response protocol?


ok guys only little game:



i have specifications project. during indicate ask following encrypt evidence over net, observant plea response protocol:




client ----------------------------- server

(1)ask plea -------------->

(2) <---------------------------- send sha1 taken time
(this challenge)
(3) sha1 xor evidence --------> it's equal sha1 xor stored password

(4) <---------------------------- extend access


for those don't know sha stands secure hashing algorithm, customary algorithm cryptography.



i wish it's clear. doubt is: i mark packets 2 3 (the "challenge" "challenge xor password", i have tangible evidence only another xor between both!?!? there proceed exercise kind protocol??



Comments

Popular posts from this blog

list macos calm editors formula editors

how i practical urls indicate .aspx pages asp.net deployed an iis? (preferably but iis)

jaxb - xjc - reworking generated typesafe enum category members