Content deleted Content added
No edit summary Tags: Visual edit Mobile edit Mobile web edit |
Minor rewording |
||
(45 intermediate revisions by 35 users not shown) | |||
Line 1:
{{Short description|Type of cryptographic protocol}}
An '''authentication protocol''' is a type of computer [[communications protocol]] or [
==Purpose ==
With the increasing amount of trustworthy information being accessible over the network, the need for keeping unauthorized persons from access to this data emerged. Stealing someone's identity is easy in the computing world - special verification methods had to be invented to find out whether the person/computer requesting data is really who he says he is.<ref>{{cite web|url = http://www.techrepublic.com/article/understanding-and-selecting-authentication-methods/|title = Understanding and selecting authentication methods|date = 28 August 2001|
# A Protocol has to involve two or more parties and everyone involved in the protocol must know the protocol in advance.
# All the included parties have to follow the protocol.
Line 14:
# Alice sends Bob her password in a packet complying with the protocol rules.
# Bob checks the received password against the one stored in his database. Then he sends a packet saying "Authentication successful" or "Authentication failed" based on the result.<ref>{{Cite book|title = Fundamentals of Cryptology|last = van Tilborg|first = Henk C.A.|publisher = Kluwer Academic Publishers|year = 2000|isbn = 0-7923-8675-2|___location = Massachusetts|pages = 66–67}}</ref>
This is an example of a very basic authentication protocol vulnerable to many threats such as [[eavesdropping]], [[replay attack]], [[man-in-the-middle]] attacks, [[Dictionary attack|dictionary attacks]] or [[Brute-force attack|brute-force attacks]]. Most authentication protocols are more complicated in order to be resilient against these attacks.<ref>{{Cite book|title = Internet Cryptography|last = Smith|first = Richard E.|publisher = Addison Wesley Longman|year = 1997|isbn = 0-201-92480-3|___location = Massachusetts|pages = [https://archive.org/details/internetcryptogr0000smit/page/1 1–27]|url = https://archive.org/details/internetcryptogr0000smit/page/1}}</ref>
==Types==
===Authentication protocols developed for PPP [[Point-to-Point Protocol]]===
Protocols are used mainly by [[Point-to-Point Protocol]] (PPP) servers to validate the identity of remote clients before granting them access to server data. Most of them use a password as the cornerstone of the authentication. In most cases, the password has to be shared between the communicating entities in advance.<ref>{{cite
[[File:PAP 2way handshake.png|thumb|PAP 2-way handshake scheme|461x461px]]
====PAP - Password Authentication Protocol====
[[Password Authentication Protocol]] is one of the oldest authentication protocols. Authentication is initialized by the client sending a packet with [[credentials]] (username and password) at the beginning of the connection, with the client repeating the authentication request until acknowledgement is received.<ref>{{cite web|url = http://data.cedupoint.cz/oppa_e-learning/2_KME/044.pdf|title = Autentizacní
====CHAP - [[Challenge-handshake authentication protocol]]====
The authentication process in this protocol is always
====[[Extensible Authentication Protocol|EAP - Extensible Authentication Protocol]]====
EAP was originally developed for PPP(Point-to-Point Protocol) but today is widely used in [[IEEE 802.3]], [[IEEE 802.11]](WiFi) or [[IEEE 802.16]] as a part of [[IEEE 802.1x]] authentication framework. The latest version is standardized in RFC 5247. The advantage of EAP is that it is only a general authentication framework for client-server authentication - the specific way of authentication is defined in its many versions called EAP-methods. More than 40 EAP-methods exist, the most common are:
Line 48:
[[Remote Authentication Dial-In User Service]] (RADIUS) is a full [[AAA (computer security)|AAA protocol
]] commonly used by [[ISP]]s. Credentials are mostly username-password combination based, and it uses [[Network access server|NAS]] and [[User Datagram Protocol|UDP]] protocol for transport.<ref>{{cite web|url = http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-1/user/guide/acsuserguide/rad_tac_phase.html|title = AAA protocols|access-date
====[[DIAMETER]]====
[[Diameter (protocol)]] evolved from RADIUS and involves many improvements such as usage of more reliable TCP or [[SCTP]] transport protocol and higher security thanks to [[Transport Layer Security|TLS]].<ref>{{cite web|url = http://www.ibm.com/developerworks/wireless/library/wi-diameter/|title = Introduction to Diameter|date = 24 January 2006|
===Other===
Line 57:
====[[Kerberos (protocol)]]====
Kerberos is a centralized network authentication system developed at [[MIT]] and available as a free implementation from MIT but also in many commercial products. It is the default authentication method in [[Windows 2000]] and later. The authentication process itself is much more complicated than in the previous protocols - Kerberos uses [[symmetric key cryptography]], requires a [[trusted third party]] and can use [[public-key cryptography]] during certain phases of authentication if need be.<ref>{{cite web|url = http://web.mit.edu/kerberos/|title = Kerberos: The Network Authentication Protocol|date = 10 September 2015|
==List of various other authentication protocols==
* [[AKA (security)|AKA]]
* [[Basic access authentication]]
* [[CAVE-based authentication]]
* [[CRAM-MD5]]
|