Back to Results
First PageMeta Content
Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols


Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 165,17 KB

Share Result on Facebook

Company

HP / Microsoft / Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries / /

/

Event

FDA Phase / /

IndustryTerm

authentication protocol / hacker tool / derivation algorithm / encryption protocol / software switches / complicated and insecure algorithm / dictionary search / response generation algorithm / /

OperatingSystem

Windows 98 / Microsoft Windows / Windows NT 4.0 / Windows NT / /

Organization

UC Berkeley / /

Person

David Wagner / /

Position

LAN Manager / Manager hash / Manager hash function and the use / Manager hash and the Windows NT hash / Private / /

Product

PZ98 / Sim94 / RC4 / CHAPv2 / ZC98 / Point / L99 / CHAPv1 / /

Technology

encryption / 1 Introduction The Point-to-Point Tunneling Protocol / less secure MS-CHAPv1 protocol / RC4 algorithm / MS-CHAP response generation algorithm / authentication protocol / complicated protocol / LAN / public key / VPN / Point Encryption protocol / key derivation algorithm / 8 protocol / complicated and insecure algorithm / secure MS-CHAPv2 protocol / encryption protocol / private key / revised protocol / MS-CHAPv2 protocol / 1999 Abstract The Point-to-Point Tunneling Protocol / SSL / operating systems / TCP/IP / export-weakened protocol / MS-CHAP protocol / stream cipher / /

SocialTag