Password Authentication Protocol: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 5:
PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (while the last is actually a framework).
 
'''Password-based authentication''' is the protocol that two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemeschemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. In general, strong-password authentication protocols have the advantages over the weak-password authentication schemes in that their computational overhead are lighter, designs are simpler, and implementation are easier, and therefore are especially suitable for some constrained environments.
 
==Working cycle==