Microsoft Challenge Handshake Authentication Protocol.ppt

Microsoft Challenge Handshake Authentication Protocol.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Microsoft Challenge Handshake Authentication Protocol.ppt

Microsoft Challenge Handshake Authentication Protocol CS265 Spring 2005 ChungShun Wei Private Network Restrict from outside access Highly secure if no bad guy has access to the physical LAN But you are also blocked if not locally Even Internet will not help Virtual Private Network (VPN) Through VPN server Remote user can connect to intranet through public internet VPN Authentication Password Authentication Protocol (PAP) Username password in clear text Use it only when VPN server only support PAP Challenge Handshake Authentication Protocol (CHAP) Encrypt password Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) Base on CHAP MS-CHAP version 1 and version 2 MS-CHAP v2 is an improvement over MS-CHAP v1 Request Login Challenge Generate 8-byte Challenge Generate 24-byte MS-CHAP Reply Retrieve Password From DB Authenticate Authenticator Response Find Out 8-byte Challenge Although 8-byte challenge did not send through in clear text Attack can easily compute 8-byte challenge by listening 16-byte random challenge from server, Peer Authenticator Challenge, and client’s username Analysis MS-CHAP Reply Attack on MS-CHAP Reply Attackers do not need 2192 effort But 256 + 256 + 216 ≈ 257 * * Request login challenge 16-byte random challenge Client Client 24-byte reply Peer Authenticator Challenge client’s username Client username Password VPN Server Match 20-byte Authenticator Response VPN Server will use 16-byte Peer Authenticator Challenge and Client’s hashed password to create 20-byte Authenticator Response Client computes its own Authenticator Response to compare with Server’s. If match, server is authenticated sanjose askjKeL35h2k49kj (16 byte) NT hash askjKeL35h2k49kj00000 (21 byte) Pad with 0 to 21 byte askjKeL 35h2k49 kj00000 Iwe652nWn8mxhUw0xjO82nzx Encrypt challenge n8mxhUw0 Iwe652nW xjO82nzx Iwe652nWn8mxhUw0xjO82nzx askjKeL35h2k49kj (16 byte) NT hash askjKeL35h2k49kj00000 (21 byte) askjKeL 35h2k49 kj00000 Encrypt challenge Iwe652nWn8mxhUw0xjO82nzx Iwe

文档评论(0)

gshshxx + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档