THE REQUESTOR RECEIVES THE TRANSMISSION, ENCRYPTS THE CHALLENGE WITHTHE SECRET KEY, AND TRANSMITS THE ENCRYPTED CHALLENGE BACK TO THEAUTHENTICATOR

3. The requestor receives the transmission, encrypts the challenge withthe secret key, and transmits the encrypted challenge back to theauthenticator.