Content deleted Content added
Swapped weak and strong (strong are not lighter than weak), updated for readability. |
m link computational overhead using Find link |
||
Line 5:
PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered unsecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (the latter is actually a [[Software framework|framework]]).
'''Password-based authentication''' is the protocol where two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. When compared to strong-password schemes, weak-password schemes tend to have lighter [[overhead (computing)|computational overhead]], the designs are simpler, and implementation is easier, making them especially suitable for some constrained environments.
==Working cycle==
|