Sep 29

Importance of CHAP Protocol

CHAP protocol

Nowadays authentication is used as the first step for security on every platform. It is a highly recommended way to secure a network against intrusion. Challenge-Handshake Authentication Protocol (CHAP) is one of the most commonly used authentication protocols worldwide, normally for remote logon purposes. It authenticates the user to the authenticating authority, generally a server, and to do that it performs a three-way handshake to verify the identity of a peer by sending a challenge message to the peer after the Link Control Protocol (LCP) phase is completed. The peer then responds by sending the value calculated by performing the one-way hash function. And if the value sent by the peer matches the value calculated by itself, then the authentication is successful.

CHAP is a very important and reliable protocol for authentication and it has various advantages over other authenticating protocols. It works on the concept of sharing a secret between the authenticating entity and the peer, but this secret is never revealed over the network, hence it increases the integrity of the authentication process. In this, the identity is authenticated by proving to the authentication entity that it knows the secret without actually telling the secret. CHAP is considered more secure than PAP (Password Authentication Protocol) as it saves the connection against the replay attacks by the peer, and unlike PAP, it does not send secret as plain text over the network, therefore saving the password, and in turn the session, from the eavesdropper. It incrementally changes the identifier and variable challenge value at a set frequency and time, hence it helps save a network from playback attacks as the exposure of the network to a single attack decreases significantly by using changing challenge values. However, the CHAP authentication is one-way only, but it can be made mutual by implementing CHAP in both directions. To make the communication more secure, CHAP does not rely on authenticating only at the start-up, but also at the regular intervals throughout the communication, by sending challenges, to make sure that there has been no intrusion in the network. The use of multiple username-secret pairs is also possible with CHAP and the secret can also be changed at any time during the session.

In conclusion, it can be said that CHAP not only helps in creating a secure session by authenticating the peer, but it also helps in verifying that authentication by periodically checking the integrity of the connection throughout.

For More info Click here

Looking for an IT Job?

Please call us on 1800 159 151, or complete the form below.

  • This field is for validation purposes and should be left unchanged.

Recent Posts

The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. The sale price is valid for registrations between 01 Dec and 10 Jan.


Find out why we are the leading choice to help boost your career in Australia

Prepare to get IT job ready in 8 weeks

Trained 10,000+ professionals and counting

Experienced Provider: Operating Since 2004

Trained staff from 1000+ Australian Businesses

We Have Placed Candidates In

Over 1000 organisations have relied on Logitrain to be their trusted training partner.

High-quality, cost-effective training in Australia
Learn More
  • This field is for validation purposes and should be left unchanged.

Dont’ Wait. Fill the form for a free no-obligation information session with our course specialists.

About The Author

Train with Confidence with our Price Beat Guarantee

Hurry, Covid discounts on Job Programs end soon

Open chat