Password Authentication Protocol: Difference between revisions

Content deleted Content added
No edit summary
Changed typo from unsecure to insecure
Line 3:
PAP is used by [[Point to Point Protocol]] to validate users before allowing them access to server resources. Almost all [[network operating system]] remote servers support PAP.
 
PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered unsecureinsecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (the latter is actually a [[Software framework|framework]]).
 
'''Password-based authentication''' is the protocol where two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. When compared to strong-password schemes, weak-password schemes tend to have lighter [[overhead (computing)|computational overhead]], the designs are simpler, and implementation is easier, making them especially suitable for some constrained environments.