Last Updated on September 26, 2021 by Admin
Which of the following statements about AK/SK authentication process is incorrect?
- When a user sends a data request, the OceanStor 9000 uses the hash-based message authentication code HMAC algorithm to encrypt SK and request content, and then generates a signature.
- After receiving the request and signature, the OceanStor 9000 uses AK to query SK.
- After SK is queried, the OceanStor 9000 uses the MDS algorithm to encrypt SK and request content, and then generates a signature.
- The OceanStor 9000 compares the received signature with the one that calculated by the system. If the two signatures are consistent, the authentication succeeds.