作者: Paul Funk
DOI:
关键词:
摘要: Systems and methods for preventing a Man-in-the-Middle attack on communications network, without combining encryption keys of an inner authentication protocol tunneling encapsulating the protocol. The performance hash function may be split between two network devices network. For example, in response to challenge issued by tunnel server, client initiate using only first part generate intermediate result (i.e., preliminary hash). then transmit server as challenge. complete remaining produce final hash. used authenticate user.