Challenge-Handshake Authentication Protocol

(redirected from Authentication protocol)

Challenge-Handshake Authentication Protocol

(networking, security, standard, protocol)
(CHAP) An authentication scheme used by PPP servers to validate the identity of the originator of the connection upon connection or any time later.

CHAP applies a three-way handshaking procedure. After the link is established, the server sends a "challenge" message to the originator. The originator responds with a value calculated using a one-way hash function. The server checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise the connection is usually terminated.

CHAP provides protection against playback attack through the use of an incrementally changing identifier and a variable challenge value. The authentication can be repeated any time while the connection is open limiting the time of exposure to any single attack, and the server is in control of the frequency and timing of the challenges. As a result, CHAP provides greater security then PAP.

CHAP is defined in RFC 1334.
Mentioned in ?
References in periodicals archive ?
He discusses the need to be federation protocol, transport protocol, and authentication protocol agnostic.
Ultralightweight Mutual Authentication Protocol (UMAP) family provides extremely low security.
There have been many works to solve these problems, and using authentication protocol is one of them.
This research explains formal verification techniques used to verify security properties of authentication protocols which is a simple but rigorous logic-based test for the authentication protocol analysis.
12] proposed a password-based anonymous authentication protocol.
Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol that can be used to authenticate iSCSI initiators at target login.
Lightweight Mutual Authentication protocol (LMAP) [3] was the first proposal in the UMAP family presented in 2006.
Security: Associating specific LUN on an iSCSI target with specific hosts can be managed through a few iSCSI access methods, such as Challenge-Handshake Authentication Protocol (CHAP), which uses an authentication token to authorize access to a particular initiator.
1 is the first small-footprint security toolkit in the market to support the latest mobile VPN standards and platforms, including the IPSec authentication protocol MobIKE, as well as mobile platforms such as Windows Mobile 5.
DH-CHAP: Diffie-Hellman Challenge Handshake Authentication Protocol
SAN FRANCISCO -- Mocana, a provider of complete open standards-based security solutions that secure next generation networks and services all the way to edge devices, today announced the full availability of the Mocana Embedded Extensible Authentication Protocol (EAP) solution.

Full browser ?