Tutorial guide to Unix sockets for network communications
Computer Communications
Improving round-trip time estimates in reliable transport protocols
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
Computer networks
UNIX network programming
Internetworking with TCP/IP (2nd ed.), vol. I
Internetworking with TCP/IP (2nd ed.), vol. I
Hi-index | 0.00 |
Networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across the network for exchanging data and exercising control. Authentication is an intrinsic activity in the context of distributed applications. A server process has to authenticate a client process, possibly running on another network, prior to granting service to that client. A password in clear text might be sent across the network for this purpose, thus endangering the system security. We propose a heuristic protocol, as an alternative approach to the authentication problem. One important characteristic of our protocol is that its success can only be asserted in a probabilistic manner, nevertheless its probability of success, in any given authentication session, can be arbitrarily increased. The major advantage, however, is that no clear text copy of a password need ever be stored or exchanged across the network under the proposed protocol.