Previous Page | Next Page

  1. Introduction
  2. Network Models
  3. Network Layers
  4. TCP/IP Protocols
  5. Microsoft Protocols
  6. IPX/SPX Protocols
  7. AppleTalk Protocols
  8. SNA Protocols
  9. Other Protocols
  10. Authentication Protocols
  11. Encryption Protocols
  12. Tunneling Protocols
  13. Terms and Definitions
  14. Credits

Authentication Protocols

Various authentication protocols are listed and described below.

  • CHAP - Challenge Handshake Authentication Protocol is a three way handshake protocol which is considered more secure than PAP. Authentication Protocol.
  • EAP - Extensible Authentication Protocol is used between a dial-in client and server to determine what authentication protocol will be used.
  • PAP - Password Authentification Protocol is a two way handshake protocol designed for use with PPP. Authentication Protocol Password Authentication Protocol is a plain text password used on older SLIP systems. It is not secure.
  • SPAP - Shiva PAP. Only NT RAS server supports this for clients dialing in.
  • DES - Data Encryption Standard for older clients and servers.
  • RADIUS - Remote Authentication Dial-In User Service used to authenticate users dialing in remotely to servers in a organization's network.
  • S/Key - A one time password system, secure against replays. RFC 2289. Authentication Protocol.
  • TACACS - Offers authentication, accounting, and authorization. Authentication Protocol.
  • MS-CHAP (MD4) - Uses a Microsoft version of RSA message digest 4 challenge and reply protocol. It only works on Microsoft systems and enables data encryption. Selecting this authentification method causes all data to be encrypted.
  • SKID - SKID2 and SKID3 are vulnerable to a man in the middle attack.