ABSTRACT
Transmissions between the client and server are authenti-
cated to ensure the integrity of the transactions. Sensitive
information (e.g., passwords) is encrypted using a shared
secret key to ensure confidentiality and prevent passwords
andother authentication information frombeingmonitoredor
captured during transmission. This is particularly important
when the data travels across public carrier (e.g., WAN) links.