Limitations of challenge-response entity authentication

作者: C. Mitchell

DOI: 10.1049/EL:19890801

关键词: Challenge–response authenticationLightweight Extensible Authentication ProtocolData Authentication AlgorithmNTLMSSPReflection attackWide Mouth Frog protocolEmail authenticationAuthenticationAuthentication protocolData securityNetwork Access ControlComputer securityChallenge responseChallenge-Handshake Authentication ProtocolComputer networkOtway–Rees protocolProtected Extensible Authentication ProtocolComputer scienceIPsec

摘要: We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method attack simple modification preventing such attacks. go on to three variants protocols show that one them is completely insecure.