作者: C. Mitchell
DOI: 10.1049/EL:19890801
关键词: Challenge–response authentication 、 Lightweight Extensible Authentication Protocol 、 Data Authentication Algorithm 、 NTLMSSP 、 Reflection attack 、 Wide Mouth Frog protocol 、 Email authentication 、 Authentication 、 Authentication protocol 、 Data security 、 Network Access Control 、 Computer security 、 Challenge response 、 Challenge-Handshake Authentication Protocol 、 Computer network 、 Otway–Rees protocol 、 Protected Extensible Authentication Protocol 、 Computer science 、 IPsec
摘要: We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method attack simple modification preventing such attacks. go on to three variants protocols show that one them is completely insecure.