How to evaluate security of non-standard challenge response implementation?
I came up with this scheme of doing challenge response. It works like this:
The server generates a random challenge and saves it
The server encrypts the challenge with the public key of the client and sends it to them
The client decrypts … Continue reading How to evaluate security of non-standard challenge response implementation?