Which of the following statements about AK/SK authentication process is incorrect?

Last Updated on September 26, 2021 by Admin

Which of the following statements about AK/SK authentication process is incorrect?

  • When a user sends a data request, the OceanStor 9000 uses the hash-based message authentication code HMAC algorithm to encrypt SK and request content, and then generates a signature.
  • After receiving the request and signature, the OceanStor 9000 uses AK to query SK.
  • After SK is queried, the OceanStor 9000 uses the MDS algorithm to encrypt SK and request content, and then generates a signature.
  • The OceanStor 9000 compares the received signature with the one that calculated by the system. If the two signatures are consistent, the authentication succeeds.