Back to Results
First PageMeta Content
Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture


Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 152,57 KB

Share Result on Facebook

City

Minneapolis / Boston / /

Company

Novell / CCP / L0pht Heavy Industries Inc / Counterpane Systems / Microsoft Corporation / New Riders Publishing / IBM / John Wiley & Sons / /

Currency

STD / pence / /

/

Event

FDA Phase / /

Facility

C. Hall / TCP port / GRE tunnel / National Institute of Standards and Technology / NBS FIPS PUB / /

IndustryTerm

client software / Internet Draft / virtual networks / private network / challenge/response protocol / particular algorithms / non-private virtual network / compression algorithms / public communications / Packet processing delay information / authentication protocol / higher-level protocols / compromised name server / above communications / encryption protocol / public network / channel protocol / challenge/response authentication protocol / encryption protocols / hacker tool / generic protocol / encryption algorithms / control channel communications looks / virtual networking / encryption algorithm / authentication protocols / virtual networking connections / /

MusicGroup

Std / /

NaturalFeature

Control Channel / /

OperatingSystem

UNIX / Windows 98 / Microsoft Windows / Windows 95 / Windows 3.1 / Windows NT / /

Organization

U.S. Department of Commerce / National Institute of Standards and Technology / Point-to-Point Tunneling Protocol PPTP / PPP Challenge Handshake Authentication Protocol / National Bureau of Standards / PPP CCP / PPP CHAP / /

Person

Van Jacobsen Compressed / Paul Jones / Brad Kemp / Wray West / Chris Hall / Mark Seiden / Inderpreet Singh / Ben McCann / David Wagner / Bruce Schneier / /

/

Position

Manager hash and the Windows NT hash / Manager hash / NT User Manager / Administrator / Lan Manager / Manager hash function / Windows NT Password Hash Functions The Lan Manager / Manager hash and the MSCHAP protocol / Registry Editor / Manager hash values / /

Product

Microsoft Corporation Portable Audio Device / Sanyo Pro-200 Cellular Phone / OS2 operating system / Windows NT / Point / PZ98 / PPTP / Sim94 / Pal96a / Ran96 / Mey96 / L0pht / BV98 / Pal96b / This / Sim96 / This patch / RC4 / OS2 / Point-to-Point Tunneling / /

ProvinceOrState

Minnesota / Massachusetts / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

PPTP Control channel protocol / higher-level protocols / encryption algorithms / Compression Control Protocol / Point-to-Point Tunneling Protocol / Pont-to-Point Tunneling Protocol / block cipher / PPP Link Control Protocol / key-exchange algorithm / secret key / operating system / html / reason encryption / encryption / 128-bit encryption / PPP Challenge Handshake Authentication Protocol / cryptography / PPP Authentication Protocols / MSCHAP protocol / Windows NT authentication protocols / encryption protocol / underlying protocol / RC4 encryption protocol / 40-bit encryption / MS-CHAP protocol / PPP Compression Control Protocol / authentication protocol / LAN / NT protocols / PPTP protocol / compression algorithms / VPN / Point-to-Point Encryption / Point-to-Point Encryption protocol / MS-CHAP challenge/response protocol / PPP Call Back Control Protocol / PPP Extensible Authentication Protocol / operating systems / 40 bit encryption / PPP Encryption Control Protocol / TCP/IP / challenge/response protocol / Point encryption / DNS / firewall / network interface card / 2 Point-to-Point Tunneling Protocol / ascii / encryption protocols / 55419 Abstract The Point-to-Point Tunneling Protocol / http / generic protocol / poor encryption / DES encryption algorithm / pre-Windows NT authentication protocols / stream cipher / challenge/response authentication protocol / using the MS-CHAP challenge/response protocol / /

URL

http /

SocialTag