Challenge handshake authentication protocols (chap), Computer Networking

Assignment Help:

Challenge Handshake Authentication Protocols (CHAP)

CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator challenge its client  peer with  its CHAP name  and a random string. The  client  must transform this  random string with a computation algorithm and a CHAP secret key. It  then returns the result with its own name. The  challenge  evaluates the reply with its own copy  of he secret key. Then it forwards a success or failure acknowledgment.  CHAP packets  when host a  is the authenticator.  In summary CAHP  is a three way handshake consisting of a challenge a response, and an acknowledgment.

The  challenge  response and response computation are all built in to PPP software. Users need to  supply a CAHP name and  a secret key known by both endpoints of the PPP connection. As long as both  endpoints  use the same kys a CAHP reply matches what the CAHP challenger expects. The important security  characteristics of CHAP is that PPP endpoints  never keys in  plain  text through  the PPP  CHAP can extend the list of  cryptographically  one way functions  used for  computing CHAP response. When PPP endpoints  negotiate CHAP authentication an I. C. P  configure request packet caries the authentication protocol 0x023 option.

After PPP endpoints agree to use CHAP  authentication the CHAP packets  to exchange appear as in  CHAP  packets include four different messages, as  distinguished by different  codes. Challenge response  success and failure.


Related Discussions:- Challenge handshake authentication protocols (chap)

Implement a web server on personal computer, Question: a) The Systems ...

Question: a) The Systems Administrator of Acme Company performs the backup of the website database file every day at 15:50. The original file location is database.sql. The Ad

Characteristic of store and forward switches, Write the characteristic of S...

Write the characteristic of Store and Forward switches? A)     Store and Forward switch will not forward fragments. B)      The longer the frame, the longer the delay (latenc

Explain the term- congestion, Explain the term- congestion The average ...

Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

What is lrc, What is LRC? In LRC, a block of bits is separated into row...

What is LRC? In LRC, a block of bits is separated into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit ar

Define v - 32 modem, Q. Define V - 32 modem? - ITU-T's V.32 standard w...

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two

What is data storage technology, Normally, we think of communications scien...

Normally, we think of communications science as dealing with the contemporaneous exchange of information among distant parties. Though, many of the same techniques employed in data

Analysis of parallel algorithms, A generic algorithm is mostly analyzed on ...

A generic algorithm is mostly analyzed on the basis of the following parameters: the time complexity (implementation time) and the space complexity (amount of space necessary). Usu

Types of Networking, How can I identify the difference types of networks

How can I identify the difference types of networks

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd