A Review of Authentication Protocols

Main Article Content

Miss. Pratiksha M. Matkar, Miss. Priyanka V. Bhiogade, Miss. Puja P. Patle,Mrs. Pratik Gangewane, Prof. F.M.Shelke

Abstract

Authentication is a process that ensures and confirms a users identity. Authorization is the process of giving someone permissions to do or have something. There are different types of authentication methods such as local password authentication, server-based-password authentication, certificate-based authentication, two-factor authentication etc. Authentication protocol developed for Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), and Extensible Authentication Protocol (EAP). There are different types of application for authentications are as follows: 1.protocols developed for PPP Point-to-Point Protocol 2. Authentication, Authorization and Accounting 3.Kerberos.

Article Details

How to Cite
, M. P. M. M. M. P. V. B. M. P. P. P. P. G. P. F. “A Review of Authentication Protocols”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 6, no. 4, Apr. 2018, pp. 220-6, doi:10.17762/ijritcc.v6i4.1548.
Section
Articles