Tunneled authentication protocol for preventing man-in-the-middle attacks

作者: Paul Funk

DOI:

关键词:

摘要: Systems and methods for preventing a Man-in-the-Middle attack on communications network, without combining encryption keys of an inner authentication protocol tunneling encapsulating the protocol. The performance hash function may be split between two network devices network. For example, in response to challenge issued by tunnel server, client initiate using only first part generate intermediate result (i.e., preliminary hash). then transmit server as challenge. complete remaining produce final hash. used authenticate user.

参考文章(13)
Yuusaku Ohta, Masashi Yamaguchi, Hiroki Yamauchi, Security communication packet processing apparatus and the method thereof ,(2001)
Antti Huima, An authentication method ,(2000)
Rolf Blom, Christian Gehrmann, Method and system for data integrity protection ,(2002)
Ronald L. Rivest, Adi Shamir, How to expose an eavesdropper Communications of the ACM. ,vol. 27, pp. 393- 394 ,(1984) , 10.1145/358027.358053