Challenge-Handshake Authentication Protocol

(redirected from Authentication protocol)
Also found in: Wikipedia.

Challenge-Handshake Authentication Protocol

(networking, security, standard, protocol)
(CHAP) An authentication scheme used by PPP servers to validate the identity of the originator of the connection upon connection or any time later.

CHAP applies a three-way handshaking procedure. After the link is established, the server sends a "challenge" message to the originator. The originator responds with a value calculated using a one-way hash function. The server checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise the connection is usually terminated.

CHAP provides protection against playback attack through the use of an incrementally changing identifier and a variable challenge value. The authentication can be repeated any time while the connection is open limiting the time of exposure to any single attack, and the server is in control of the frequency and timing of the challenges. As a result, CHAP provides greater security then PAP.

CHAP is defined in RFC 1334.
Mentioned in ?
References in periodicals archive ?
This research explains formal verification techniques used to verify security properties of authentication protocols which is a simple but rigorous logic-based test for the authentication protocol analysis.
12] proposed a password-based anonymous authentication protocol.
Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol that can be used to authenticate iSCSI initiators at target login.
Security: Associating specific LUN on an iSCSI target with specific hosts can be managed through a few iSCSI access methods, such as Challenge-Handshake Authentication Protocol (CHAP), which uses an authentication token to authorize access to a particular initiator.
1 is the first small-footprint security toolkit in the market to support the latest mobile VPN standards and platforms, including the IPSec authentication protocol MobIKE, as well as mobile platforms such as Windows Mobile 5.
DH-CHAP: Diffie-Hellman Challenge Handshake Authentication Protocol
SAN FRANCISCO -- Mocana, a provider of complete open standards-based security solutions that secure next generation networks and services all the way to edge devices, today announced the full availability of the Mocana Embedded Extensible Authentication Protocol (EAP) solution.
Support for all major Extensible Authentication Protocol (EAP) protocols;
1x Extensible Authentication Protocol (EAP) with Transport Layer Security (TLS), Tunneled Transport Layer Security (TTLS), Lightweight Extensible Authentication Protocol (LEAP), Protected Extensible Authentication Protocol (PEAP) or Flexible Authentication via Secure Tunneling (FAST); Open System or Shared Key support with Wired Equivalent Privacy (WEP) encoding; WPA (Wi-Fi Protected Access) Personal (WPA-PSK) and Enterprise modes, which utilize improved encryption via the Temporal Key Integrity Protocol (TKIP); and WPA2, which adds Advanced Encryption Standard (AES).
Support for Extensible Authentication Protocol (EAP)
Moreover, online retailers who participate in the 3-D Secure authentication protocol are now assured added protection against fraudulent chargebacks from ING Card-based transactions.

Full browser ?