All > Technology > Security
- An authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a shared secret (often by hashing the challenge and secret together) to generate a response that is sent to the verifier. The verifier knows the shared secret and can independently compute the response and compare it with the response generated by the claimant. If the two are the same, the claimant is considered to have successfully authenticated himself. When the shared secret is a cryptographic key, such protocols are generally secure against eavesdroppers. When the shared secret is a password, an eavesdropper does not directly intercept the password itself, but the eavesdropper may be able to find the password with an off-line password guessing attack.
NIST - Cite This Source - This Definition
- Authentication protocol, Dynamic Host Configuration Protocol (DHCP), Kerberos, Proof of Possession Protocol (PoP Protocol), Protocol Data Unit, Protocol Run, Secure Communication Protocol, Shared Secret, Transport Layer Security (TLS), Tunneled Password Protocol