Challenge handshake authentication protocols (chap), Computer Networking

Challenge Handshake Authentication Protocols (CHAP)

CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator challenge its client  peer with  its CHAP name  and a random string. The  client  must transform this  random string with a computation algorithm and a CHAP secret key. It  then returns the result with its own name. The  challenge  evaluates the reply with its own copy  of he secret key. Then it forwards a success or failure acknowledgment.  CHAP packets  when host a  is the authenticator.  In summary CAHP  is a three way handshake consisting of a challenge a response, and an acknowledgment.

The  challenge  response and response computation are all built in to PPP software. Users need to  supply a CAHP name and  a secret key known by both endpoints of the PPP connection. As long as both  endpoints  use the same kys a CAHP reply matches what the CAHP challenger expects. The important security  characteristics of CHAP is that PPP endpoints  never keys in  plain  text through  the PPP  CHAP can extend the list of  cryptographically  one way functions  used for  computing CHAP response. When PPP endpoints  negotiate CHAP authentication an I. C. P  configure request packet caries the authentication protocol 0x023 option.

After PPP endpoints agree to use CHAP  authentication the CHAP packets  to exchange appear as in  CHAP  packets include four different messages, as  distinguished by different  codes. Challenge response  success and failure.

Posted Date: 3/18/2013 11:33:34 PM | Location : United States







Related Discussions:- Challenge handshake authentication protocols (chap), Assignment Help, Ask Question on Challenge handshake authentication protocols (chap), Get Answer, Expert's Help, Challenge handshake authentication protocols (chap) Discussions

Write discussion on Challenge handshake authentication protocols (chap)
Your posts are moderated
Related Questions
Question 1 Distinguish CISC and RISC Question 2 Write a short note on Asynchronous Transfer Mode of transmission Question 3 Explain various client/server applications using Ja

Q. Resolution of domain name system? - Mapping a name to an address or else an address to a name - Resolver is a DNS client used by an address to provide mapping - In re

Unguided Media: Wireless - A Wireless communication transporting electromagnetic waves without a physical conductor Wireless Propagation Methods - Ground - radio

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

QUESTION a) How is an Intranet different from an Internet? b) State the main differences between a router and a switch c) Explain the function of a modem d) Calculate

Frequency Division Multiplexing Frequency  division  multiplexing (FDM) is an analogy technique that can be applied when the bandwidth of a link is greater than the combined b

QUESTION (a) Figure 3 below shows a reference model of the Foundations of Intelligent Physical Agents (FIPA). Explain the roles of the following components (i) Agent platfor

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

what role would you assign for Pentium iii, 500 MHz processor, 256 MB memory, 1o GB hard drive

What is difference among Path and Classpath? Path and Classpath are operating system level environment variales. Path is used explain where the system can find the executabl