Challenge handshake authentication protocols (chap), Computer Networking

Challenge Handshake Authentication Protocols (CHAP)

CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator challenge its client  peer with  its CHAP name  and a random string. The  client  must transform this  random string with a computation algorithm and a CHAP secret key. It  then returns the result with its own name. The  challenge  evaluates the reply with its own copy  of he secret key. Then it forwards a success or failure acknowledgment.  CHAP packets  when host a  is the authenticator.  In summary CAHP  is a three way handshake consisting of a challenge a response, and an acknowledgment.

The  challenge  response and response computation are all built in to PPP software. Users need to  supply a CAHP name and  a secret key known by both endpoints of the PPP connection. As long as both  endpoints  use the same kys a CAHP reply matches what the CAHP challenger expects. The important security  characteristics of CHAP is that PPP endpoints  never keys in  plain  text through  the PPP  CHAP can extend the list of  cryptographically  one way functions  used for  computing CHAP response. When PPP endpoints  negotiate CHAP authentication an I. C. P  configure request packet caries the authentication protocol 0x023 option.

After PPP endpoints agree to use CHAP  authentication the CHAP packets  to exchange appear as in  CHAP  packets include four different messages, as  distinguished by different  codes. Challenge response  success and failure.

Posted Date: 3/18/2013 11:33:34 PM | Location : United States

Related Discussions:- Challenge handshake authentication protocols (chap), Assignment Help, Ask Question on Challenge handshake authentication protocols (chap), Get Answer, Expert's Help, Challenge handshake authentication protocols (chap) Discussions

Write discussion on Challenge handshake authentication protocols (chap)
Your posts are moderated
Related Questions
There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

State about the Cell sectoring With cell sectoring, a cell is separated into a number of wedge-shaped sectors, each with its own set of channels, typically 3 or 6 sectors per c

Q. Define internet network address? The internet network address is additional commonly called the -IP address.? It consists of 32 bits a few of which are allocated to a hi

What is client/server? Client/server is a type of network wherein one or more computers act as servers. Servers give a centralized repository of resources like printers and fil

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

advantages and disadvantages of time sharing system

You require connecting two computers for file sharing. Is it possible to do this without using a hub or router? Yes, you can connect two computers together using only one cable

Hello, I have a question which is due tomorrow (2/15/2013) at 11:55pm. The configuration portion of the exercise has been completed. I only need the questions in bold answered (onl