Documente Academic
Documente Profesional
Documente Cultură
BELGAUM-590014
A SEMINAR REPORT ON
“EAP (Extensible Authentication Protocol)”
BACHELOR OF ENGINEERING IN
BY
POOJA RAVI (4VV06IS037)
ENGINEERING
MYSORE
CERTIFICATE
Guide H.O.D
The satisfaction that accompanies the successful completion of any task would be
incomplete without mention of the people, who made it possible, whose constant guidance
and encouragement crowned our efforts with success. I take this opportunity to express my
deepest gratitude and appreciation to all those who have helped me directly towards the
successful completion of this seminar.
I would like to thank all my lecturers and friends from V.V.C.E. Mysore, for
their support and encouragement for seminar.
I would like to thank my family, for their encouragement throughout my life and the
post-graduate study.
POOJA RAVI
ABSTRACT
Communication is an inseparable part of social life. Written, Oral, or Signed; there are
many ways of communication. Now machines play a greater role in the establishment of
communication between two units. When we communicate we do so according to some
rules. For example, both should understand a common language may be a rule for
starters. But machines on the other hand need a complex set of rules as they have no
intelligence and to secure our communiqué is our responsibility. So we have developed a
number of methods and rules in order to protect our privacy. These rules are clubbed
together as “Protocols”. This documentation presents one such set of protocols that are
used to confirm the identity of a person so that he can communicate with others without
any obstruction and prevent any one else trying to pry or eavesdrop in an ongoing
communication. These protocols are called Extensible Authentication Protocols. They
identify a user and his requirements as he tries to connect to the network. Then the server
gets the authentication for what are the resources and methods he is entitled to use.
On completion of this process the channel being requested is secured and becomes ready
to use. Once the communication starts the work of the protocol is limited to keep the
channel protected. Thus EAP ensures the privacy and security of a connection for
individual users.
TABLE OF CONTENTS
1. Introduction…………………………………………………………………1
2. PPPEAP…………………………………………………………………….2
3.1 Identity……………………………………………………………....9
3.2 Notification…………………………………………………………..9
3.3 Nak………………………………………………………………….10
4. Security Considerations…………………………………………………....13
5.1 LEAP………………………………………………………………...14
5.5 PEAP………………………………………………………………....17
Conclusion
Reference