Skip to main content
A code used in the authentication process. The first system creates a challenge code made up of random numbers, which it sends to the second system. The second system encrypts the received code using its own cryptographic key, and it sends back the encrypted code to the first system. The first system decrypts the response code of the second system, and if the decrypted code matches the challenge code of the first system, then the authentication is succeeded.