ABSTRACT

Transmissions between the client and server are authenti-

cated to ensure the integrity of the transactions. Sensitive

information (e.g., passwords) is encrypted using a shared

secret key to ensure confidentiality and prevent passwords

andother authentication information frombeingmonitoredor

captured during transmission. This is particularly important

when the data travels across public carrier (e.g., WAN) links.