Data Protection and Security |
||||||
VII |
Identification and Entity Authentication |
|||||
VII.III |
Authentication Protocols |
|||||
In the previous section, we have seen that transmission of cleartext password poses eavesdropping risks and a common attack is “listen to the channel, steal the password and replay it later”. Even without using any hardware, there are many solutions of this basic problem including:
In this section, we will briefly explain these more advanced authentication protocols. |
||||||
|
||||||
|
chapter index | |||||