Authentication protocol
Encyclopedia
An authentication protocol is a type of cryptographic protocol
Cryptographic protocol
A security protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.A protocol describes how the algorithms should be used...

 with the purpose of authenticating
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 entities wishing to communicate securely.

There are many different authentication protocols such as:
  • AKA
    AKA (security)
    AKA stands for the Authentication and Key Agreement. It is a security protocol used in 3G networks.AKA is also used for one-time password generation mechanism for Digest access authentication. AKA is a challenge-response based mechanism that uses symmetric cryptography.-AKA in CDMA:AKA –...

  • CAVE-based authentication
    CAVE-based Authentication
    CAVE-based Authentication is an access authentication used in CDMA/1xRTT network systems.-CAVE :gtv...

  • Challenge-handshake authentication protocol
    Challenge-handshake authentication protocol
    In computing, the Challenge-Handshake Authentication Protocol authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider. CHAP is specified in RFC 1994....

     (CHAP)
  • CRAM-MD5
    CRAM-MD5
    In cryptography, CRAM-MD5 is achallenge-response authentication mechanism defined in RFC 2195 based on theHMAC-MD5 MACalgorithm...

  • Diameter
  • Extensible Authentication Protocol
    Extensible Authentication Protocol
    Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and was updated by RFC 5247....

     (EAP)
  • Host Identity Protocol
    Host Identity Protocol
    The Host Identity Protocol is a host identification technology for use on Internet Protocol networks, such as the Internet. The Internet has two main name spaces, IP addresses and the Domain Name System. HIP separates the end-point identifier and locator roles of IP addresses...

     (HIP)
  • Kerberos
  • MS-CHAP
    MS-CHAP
    MS-CHAP is the Microsoft version of the Challenge-handshake authentication protocol, CHAP. The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2...

     and MS-CHAPv2 variants of CHAP
  • LAN Manager
    LAN Manager
    LAN Manager was a Network Operating System available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation. It was designed to succeed 3Com's 3+Share network server software which ran atop a heavily modified version of MS-DOS.-Development history:LAN Manager was...

  • NTLM
    NTLM
    In a Windows network, NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users....

    , also known as NT LAN Manager
  • Password-authenticated key agreement
    Password-authenticated key agreement
    In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.-Types:...

     protocols
  • Password Authentication Protocol
    Password authentication protocol
    A password authentication protocol is an authentication protocol that uses a password.PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP.PAP transmits unencrypted ASCII passwords...

     (PAP)
  • Protected Extensible Authentication Protocol
    Protected Extensible Authentication Protocol
    The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol within an encrypted and authenticated Transport Layer Security tunnel...

     (PEAP)
  • RADIUS
    RADIUS
    Remote Authentication Dial In User Service is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for computers to connect and use a network service...

  • Secure Remote Password protocol
    Secure remote password protocol
    The Secure Remote Password protocol is a password-authenticated key agreement protocol.- Overview :The SRP protocol has a number of desirable properties: it allows a user to authenticate themselves to a server, it is resistant to dictionary attacks mounted by an eavesdropper, and it does not...

     (SRP)
  • TACACS
    TACACS
    Terminal Access Controller Access-Control System is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has...

     and TACACS+
    TACACS+
    TACACS+ is a Cisco Systems proprietary protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers...

  • RFID-Authentication Protocols
  • Woo Lam 92 (protocol)
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK