protocol used by ISPs to authenticate their clients. In this scheme, a value is sent to the client (the machine making the connection), which it uses to calculate a hash based on the value. The client sends the hash back to the server for comparison to the hash calculated by the server. This authentication method is different from PAP in that it re- authenticates on a periodic basis after the initial authentication. See Also PAP. CIFS
The Challenge-Handshake Authentication Protocol uses a challenge/response authentication mechanism where the response varies every challenge to prevent replay attacks.
An authentication method that can be used when connecting to an Internet Service Provider. CHAP allows you to login to your provider automatically, without the need for a terminal screen. It is more secure than the Password Authentication Protocol (another widely used authentication method) since it does not send passwords in text format.
A method of authentication when connecting to an Internet service provider.
This protocol is used in PPP connections to authenticate the identity of the requestor to the PPP server at the start of the communication session.
protocol used by ISP s to authenticate their clients. In this scheme, a value is sent to the client (the machine who connects), the client calculates a hash from this value which it sends to the server, and the server compares the hash with the one it has calculated. It is different from PAP in that it re-authenticates on a periodic basis after the initial authentication. See Also: PAP. CIFS
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user to an Internet access provider.