Challenge handshake authentication protocols (chap), Computer Networking

Assignment Help:

Challenge Handshake Authentication Protocols (CHAP)

CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator challenge its client  peer with  its CHAP name  and a random string. The  client  must transform this  random string with a computation algorithm and a CHAP secret key. It  then returns the result with its own name. The  challenge  evaluates the reply with its own copy  of he secret key. Then it forwards a success or failure acknowledgment.  CHAP packets  when host a  is the authenticator.  In summary CAHP  is a three way handshake consisting of a challenge a response, and an acknowledgment.

The  challenge  response and response computation are all built in to PPP software. Users need to  supply a CAHP name and  a secret key known by both endpoints of the PPP connection. As long as both  endpoints  use the same kys a CAHP reply matches what the CAHP challenger expects. The important security  characteristics of CHAP is that PPP endpoints  never keys in  plain  text through  the PPP  CHAP can extend the list of  cryptographically  one way functions  used for  computing CHAP response. When PPP endpoints  negotiate CHAP authentication an I. C. P  configure request packet caries the authentication protocol 0x023 option.

After PPP endpoints agree to use CHAP  authentication the CHAP packets  to exchange appear as in  CHAP  packets include four different messages, as  distinguished by different  codes. Challenge response  success and failure.


Related Discussions:- Challenge handshake authentication protocols (chap)

How is computer networks used in marketing and sales, How is computer netwo...

How is computer networks used in marketing and sales, financial services, teleconferencing? Computer network have led to a new age of all of these services. They have helped in

Explain physical layer of osi reference model, Q. Explain physical layer of...

Q. Explain physical layer of Osi reference model? - The physical layer deals among the physical characteristics of the transmission medium. - It defines the mechanical, elec

what is sad, In IPSec what is SAD, SPD and SA's

In IPSec what is SAD, SPD and SA's?

Routers - network layer and routing , Routers The network  layer (also ...

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

Determine the maximum number of stations, (i)  Suppose N stations are conne...

(i)  Suppose N stations are connected to an extended Ethernet LAN, as shown below shown in Figure operating at the rate of 10 Mbps. Assume that the efficiency of each Ethernet is 8

Function of tcp - ip transport layer, Q. Function of TCP/IP Transport Layer...

Q. Function of TCP/IP Transport Layer ? TCP/IP Transport Layer - Defines two standard transport protocols UDP and TCP - TCP equipment a dependable data-stream protocol

Networking, discuss the interdependence of workstation hardware with releva...

discuss the interdependence of workstation hardware with relevant software

What is redirector, What is redirector? Redirector is software that int...

What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd