Abstract
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We show how to break both the challenge/response authentication protocol (Microsoft CHAP) and the RC4 encryption protocol (MPPE), as well as how to attack the control channel in Microsoft's implementation. These attacks do not necessarily break PPTP, but only Microsoft's implementation of the protocol.
Cite
CITATION STYLE
Schneier, B., & Mudge. (1998). Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP). In Proceedings of the ACM Conference on Computer and Communications Security (pp. 132–141). ACM. https://doi.org/10.1145/288090.288119
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.