Password Authentication Protocol: Difference between revisions

Content deleted Content added
I have changed the word 'insecure' to 'unsecure' since the unencrypted passwords are probably not considered timid or self-doubting.
Orever (talk | contribs)
Swapped weak and strong (strong are not lighter than weak), updated for readability.
Line 5:
PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered unsecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (the latter is actually a [[Software framework|framework]]).
 
'''Password-based authentication''' is the protocol thatwhere two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. InWhen general,compared to strong-password authentication protocols have the advantages over theschemes, weak-password authentication schemes intend thatto theirhave lighter computational overhead, are lighter,the designs are simpler, and implementation areis easier, andmaking therefore arethem especially suitable for some constrained environments.
 
==Working cycle==