Content deleted Content added
No edit summary |
No edit summary |
||
Line 3:
PAP is used by [[Point to Point Protocol]] to validate users before allowing them access to server resources. Almost all [[network operating system]] remote servers support PAP.
PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered
'''Password-based authentication''' is the protocol where two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. When compared to strong-password schemes, weak-password schemes tend to have lighter [[overhead (computing)|computational overhead]], the designs are simpler, and implementation is easier, making them especially suitable for some constrained environments.
|