Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)

40Citations
Citations of this article
63Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We show how to break both the challenge/response authentication protocol (Microsoft CHAP) and the RC4 encryption protocol (MPPE), as well as how to attack the control channel in Microsoft's implementation. These attacks do not necessarily break PPTP, but only Microsoft's implementation of the protocol.

Cite

CITATION STYLE

APA

Schneier, B., & Mudge. (1998). Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP). In Proceedings of the ACM Conference on Computer and Communications Security (pp. 132–141). ACM. https://doi.org/10.1145/288090.288119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free