Extensible Authentication Protocols

The Extensible Authentication Protocol (EAP) is an authentication framework widely used in network access authentication. It provides a flexible and extensible way to support multiple authentication methods, making it a versatile choice for various networking environments such as wireless networks, VPNs, and wired Ethernet.

Protocol

Description

Use Case

EAP‑TLS

Certificate‑based mutual authentication using X.509 over TLS; highly secure but infrastructure-intensive.

Enterprise Wi‑Fi and secure access networks.

EAP‑PEAP (MSCHAPv2)

Encapsulates MSCHAPv2 inside a TLS tunnel; password-based, simpler setup, widely supported.

WPA2‑Enterprise for mixed‑device networks.

EAP‑PEAP (TLS)

Inner TLS authentication using client certificate within PEAP tunnel.

High‑security enterprise deployments with cert‑based identity.

EAP‑PEAP (GTC)

Uses Generic Token Card inside TLS—suitable for OTP or token systems.

Network access using one‑time tokens.

EAP‑PEAP (MD5‑Challenge)

Legacy MD5 challenge inside TLS; deprecated due to weak hashing.

Legacy systems only.

EAP‑TTLS (EAP‑MD5‑Challenge)

Uses legacy MD5 challenge inside TTLS tunnel.

Backward‑compatibility deployments.

EAP‑TTLS (EAP‑GTC)

GTC inner method inside TTLS.

Token‑based secure access.

EAP‑TTLS (EAP‑MSCHAPv2)

MSCHAPv2 inside TTLS.

Commonly used in RADIUS Wi‑Fi networks.

EAP‑TTLS (MSCHAPv2)

Variant with only MSCHAPv2.

Similar use as above.

EAP‑TTLS (EAP‑TLS)

Client cert inside TTLS tunnel.

High‑security deployments avoiding full EAP‑TLS rollout.

EAP‑TTLS (MSCHAP)

MSCHAP (v1) inside TTLS.

Legacy support for older devices.

EAP‑TTLS (PAP)

PAP inside TTLS—simplest but least secure.

Legacy integration.

EAP‑TTLS (CHAP)

CHAP inside TTLS.

Slightly better than PAP.

EAP‑SIM

Uses GSM SIM credentials for authentication.

Seamless cellular network authentication.

EAP‑AKA

Uses UMTS/3G USIM credentials.

Mobile networks (3G/LTE).

EAP‑AKA′ (Prime)

Enhanced AKA with improved privacy and protection.

Secure 4G/5G authentication.

EAP‑PAX

Password‑based authenticated key exchange method.

Secure access with password only.

EAP‑PSK

Uses a pre‑shared symmetric key (AES‑128) for mutual auth and key derivation :contentReference[oaicite:0]{index=0}.

Lightweight secure Wi‑Fi without PKI.

EAP‑SAKE

Password and key based authentication with shared secret.

Secure network access where PSK needed with improved protection.

EAP‑FAST

Cisco’s Flexible Authentication via Secure Tunneling; uses PAC instead of certs.

Enterprise access with reduced PKI reliance.

EAP‑IKEv2

Leverages IKEv2 for mutual authentication and key derivation.

Secure, certificate‑based access.

EAP‑GPSK

Group PSK method for multiple clients.

Group access scenarios with shared key.

EAP‑MD5‑Challenge

Simple MD5‑based challenge; one-sided authentication.

Limited internal networks; deprecated for higher‑security needs.

EAP‑MSCHAPv2

Microsoft challenge‑response protocol.

Windows networks, older legacy setups.

EAP‑GTC

Generic Token Card pass‑through method.

Token or OTP based access systems.

EAP‑TNC

Network Access Control with integrity checking (Trusted Network Connect).

Compliance‑based network access controls.

EAP-OTP

One-Time Password based EAP method that provides password authentication using OTP tokens; enhances security over static passwords.

Secure wireless and VPN access with dynamic password tokens.

EAP-TTLS/EAP-OTP

Uses tunneled TLS to protect inner EAP-OTP authentication; combines certificate-based server authentication with OTP client authentication.

Enterprise wireless networks requiring strong server authentication and OTP client authentication.

EAP-PEAP/OTP

Encapsulates OTP authentication inside a TLS tunnel secured by server certificates; protects OTP exchange and enhances security.

WPA2-Enterprise with OTP for added security in wireless environments.

LEAP

Cisco proprietary EAP using password-based MS-CHAP mutual authentication; simple but vulnerable to dictionary attacks.

Legacy Cisco wireless networks (mostly deprecated today).

EAP‑PWD

Performs mutual authentication via a zero-knowledge password proof using elliptic curve cryptography (ECC). No certificates required.

Secure password-only Wi‑Fi authentication without certificate infrastructure.

EAP‑EKE

Password-authenticated key exchange using encrypted Diffie-Hellman; protects against dictionary attacks, no certificates required.

Lightweight mutual authentication in networks lacking certificate management (e.g., IoT, VPN, Wi‑Fi).

RFC / Specification: RFC 5216

Main Features:

  • Uses mutual authentication with client and server certificates

  • Strongest security among EAP methods (based on TLS)

  • Supports session resumption via TLS caching

  • Vulnerable to poor certificate management, but highly secure if managed properly

  • Typically used with RADIUS for backend authentication

Use Cases:

  • Enterprise Wi-Fi security (WPA2/WPA3-Enterprise)

  • VPN authentication requiring high assurance

  • Environments demanding certificate-based identity verification

Alternative Protocols:

  • EAP-PEAP – TLS tunnel but only server-side cert required

  • EAP-TTLS – TLS tunnel with flexible inner authentication

  • EAP-FAST – Tunnel-based, supports faster re-authentication

  • EAP-MSCHAPv2 – Password-based, weaker compared to cert-based options

RFC / Specification: Drafts by Microsoft, Cisco, RSA; not formally RFC-standardized.

Main Features:

  • Encapsulates EAP within a secure TLS tunnel (only server certificate required)

  • Inside the tunnel, performs username/password authentication using MSCHAPv2

  • Widely supported across platforms (Windows, Linux, Android, etc.)

  • Provides encryption and integrity through TLS, simplifying cert management

  • Vulnerable to dictionary attacks if password complexity is weak

Use Cases:

  • WPA2/WPA3-Enterprise networks in corporate environments

  • University or enterprise-level wireless access requiring username/password

  • Environments where client certificates are not feasible

Alternative Protocols:

  • EAP-TLS – stronger security, mutual certificate authentication

  • EAP-TTLS – similar tunnel but with multiple inner auth options

  • EAP-FAST – more efficient re-authentication with similar tunnel setup

RFC / Specification: Draft-based (PEAP not an official IETF RFC) Common Implementations: Microsoft NPS, FreeRADIUS, Cisco ISE

Main Features:

  • Uses TLS tunnel (outer method) to protect inner authentication method

  • Inner method is EAP‑TLS, enabling mutual authentication with client/server certificates

  • Secure channel prevents exposure of credentials or authentication data

  • Supports server certificate validation and optional client certificate authentication

  • Provides strong encryption and integrity via TLS handshake

  • More flexible than plain EAP‑TLS, with support for tunneled methods

Use Cases:

  • Secure enterprise Wi‑Fi authentication (e.g., 802.1X networks)

  • Organizations requiring strong mutual certificate-based auth over a protected tunnel

  • Scenarios where PKI is already deployed for users and infrastructure

  • Hybrid systems where PEAP is used with fallback methods like MSCHAPv2 or GTC

Alternative Protocols:

  • EAP‑TLS – Direct certificate-based authentication without inner method

  • EAP‑PEAP‑MSCHAPv2 – Same outer tunnel, but inner method is password-based

  • EAP‑TTLS‑EAP‑TLS – Similar tunneled certificate-based approach using TTLS instead of PEAP

  • EAP‑FAST – Cisco alternative using PACs instead of certificates

RFC / Specification: Draft (not standardized as an RFC) Common Implementations: Cisco ISE, FreeRADIUS, Microsoft NPS (limited)

Main Features:

  • PEAP (Protected EAP) provides an outer encrypted TLS tunnel

  • GTC (Generic Token Card) is used as the inner method

  • Supports one-time passwords (OTPs), token-based credentials, or plaintext passwords

  • Server certificate required; client certificate not required

  • Passwords or tokens are sent inside the TLS tunnel in plaintext or challenge form

  • Compatible with hardware/software tokens (e.g., RSA SecurID, OTP apps)

Use Cases:

  • Two-factor authentication (2FA) using OTP inside an EAP method

  • Organizations using token-based identity systems

  • Enterprises with RADIUS backend supporting OTP schemes

  • Secure Wi‑Fi (802.1X) login with time-based tokens (TOTP/HOTP)

Alternative Protocols:

  • EAP‑PEAP‑MSCHAPv2 – Uses password-based challenge-response (no OTP)

  • EAP‑TTLS‑GTC – Similar approach using TTLS instead of PEAP

  • EAP‑FAST – Cisco protocol with support for tunneled inner authentication

  • EAP‑TLS – Strong security using certificates, but no OTP support

  • EAP‑TTLS‑PAP – Can carry plaintext passwords over a secure tunnel

RFC / Specification: - PEAP: Defined in [Microsoft Draft and Cisco Implementations] - EAP-MD5: [RFC 3748] (as an inner method)

Main Features:

  • PEAP provides an encrypted outer TLS tunnel

  • MD5-Challenge is used as the inner authentication method

  • Relies on username/password challenge-response

  • No support for mutual authentication

  • Server certificate is required; client certificate is optional

  • Weak security due to outdated MD5 hash algorithm

  • Vulnerable to dictionary and offline attacks if tunnel is compromised

Use Cases:

  • Legacy systems requiring lightweight challenge-response authentication

  • Test environments with minimal security requirements

  • Low-resource devices using simple password authentication

  • Temporary setups in closed, isolated networks

Alternative Protocols:

  • EAP-PEAP-MSCHAPv2 – Stronger password-based authentication

  • EAP-TTLS-MSCHAPv2 – Uses TTLS tunnel with MSCHAPv2 inner method

  • EAP-TLS – Strong certificate-based mutual authentication

  • EAP-FAST – Secure tunneling with optional PAC provisioning

  • EAP-TTLS-PAP – Allows plaintext password inside secure tunnel

Specification: RFC 5281

Main Features:

  • EAP-TTLS (Tunneled TLS) used as outer authentication method.

  • EAP-MD5-Challenge used as inner authentication method.

  • Credentials (username/password) are transmitted within the secure TLS tunnel.

  • Provides encryption and server authentication via certificates.

  • EAP-MD5 does not support mutual authentication or password salting.

Use Cases:

  • Enterprise Wi-Fi networks with internal user databases.

  • Legacy systems requiring EAP-MD5 for backward compatibility within a secure tunnel.

  • Scenarios where fast authentication is needed but full mutual authentication is not critical.

Alternative Protocols:

  • EAP-TTLS with MSCHAPv2 or PAP – for better security and password compatibility.

  • EAP-PEAP with MSCHAPv2 – for Microsoft environment compatibility.

  • EAP-TLS – for mutual certificate-based authentication.

  • EAP-FAST – Cisco proprietary, lightweight tunnel alternative.

Specification: RFC 5281

Main Features:

  • EAP-TTLS (Tunneled TLS) used as the outer authentication layer.

  • EAP-GTC (Generic Token Card) used as the inner authentication protocol.

  • Credentials (e.g., one-time password or token) are transmitted securely within the TLS tunnel.

  • Enables token-based or one-time password authentication over secure transport.

  • TLS provides encryption, integrity, and server authentication via digital certificates.

Use Cases:

  • Enterprises using hardware or software token generators for two-factor authentication.

  • Authentication systems requiring support for non-password-based credentials.

  • Secure Wi-Fi access in organizations requiring token-based login methods.

  • VPN or remote access setups using EAP with secure credential exchange.

Alternative Protocols:

  • EAP-TTLS with MSCHAPv2 – for compatibility with password-based systems.

  • EAP-PEAP with GTC – for Microsoft-friendly GTC in a PEAP tunnel.

  • EAP-FAST – Cisco’s protocol with PAC-based tunnel authentication.

  • EAP-TLS – for mutual certificate-based authentication without token dependency.

Specification: RFC 5281

Main Features:

  • EAP-TTLS provides a secure outer TLS tunnel.

  • MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol v2) used inside the tunnel.

  • Password-based authentication protected within an encrypted TLS session.

  • Supports mutual authentication (server certificate + client credentials).

  • Reduces client certificate requirement; only server-side cert needed.

Use Cases:

  • Enterprise Wi-Fi (802.1X) with username/password login.

  • VPN authentication using EAP methods.

  • Institutions needing secure password authentication without deploying client certificates.

  • RADIUS-based authentication systems.

Alternative Protocols:

  • EAP-PEAP with MSCHAPv2 – Microsoft-preferred equivalent.

  • EAP-TLS – for full certificate-based mutual authentication.

  • EAP-TTLS with PAP or CHAP – alternative tunneled credential options.

  • EAP-FAST – PAC-based tunnel without requiring external certificates.

Specification: RFC 5281

Main Features:

  • EAP-TTLS establishes a secure outer TLS tunnel.

  • MSCHAPv2 credentials (username/password) are sent directly within the TLS tunnel.

  • No inner EAP method used—only raw MSCHAPv2 inside the secure tunnel.

  • Reduces deployment complexity by eliminating need for client certificates.

  • Supports server certificate authentication.

Use Cases:

  • Secure enterprise Wi-Fi access using RADIUS backend.

  • Environments where user credentials must remain private without full EAP stack.

  • Institutions or corporations standardizing on MSCHAPv2 for password handling.

  • VPN and network access solutions using TTLS with legacy authentication.

Alternative Protocols:

  • EAP-TTLS with EAP-MSCHAPv2 – adds more flexibility via inner EAP method.

  • EAP-PEAP with MSCHAPv2 – Microsoft’s preferred tunnel method.

  • EAP-TLS – stronger security through certificate-based mutual authentication.

  • EAP-FAST – PAC-based approach with lightweight tunnel.

Specification: RFC 5281

Main Features:

  • Combines EAP-TTLS (outer TLS tunnel) with EAP-TLS as the inner authentication method.

  • Provides mutual certificate-based authentication within a protected tunnel.

  • Separates authentication layers: TLS tunnel protects inner EAP method.

  • Offers strong security without exposing credentials to the outer network.

  • Useful in complex identity environments or for adding secondary identity validation.

Use Cases:

  • Enterprises requiring dual-layer certificate-based authentication.

  • Environments with legacy support for TTLS but needing EAP-TLS internally.

  • Enhanced secure Wi-Fi access in universities, large offices, or sensitive environments.

  • Migration paths from password-based EAP methods to full certificate-based EAP-TLS.

Alternative Protocols:

  • EAP-TLS – simpler, direct certificate-based authentication without nesting.

  • EAP-TTLS with MSCHAPv2 – for password-based methods within a TLS tunnel.

  • EAP-PEAP with TLS – similar nesting but using PEAP instead of TTLS.

  • EAP-FAST – uses PACs to enable tunneled authentication, no certificates required.

Specification: RFC 5281

Main Features:

  • Uses EAP-TTLS to create a secure TLS tunnel and performs MSCHAP (not v2) inside it.

  • Supports username/password-based authentication without exposing credentials in clear text.

  • Offers protection of legacy authentication protocols via encrypted tunnel.

  • More secure than using MSCHAP without tunneling.

  • Reduces need for client-side certificates.

Use Cases:

  • Legacy enterprise systems still using MSCHAP needing encryption.

  • Secure Wi-Fi access in older or mixed-platform environments.

  • VPNs and remote access systems requiring tunneled password authentication.

  • Migration environments where certificate deployment is limited.

Alternative Protocols:

  • EAP-TTLS-MS-CHAPv2 – newer version of MSCHAP inside TTLS.

  • EAP-TTLS-PAP – simple password auth within TLS tunnel.

  • EAP-PEAP-MS-CHAPv2 – Microsoft-compatible password-based EAP in TLS tunnel.

  • EAP-TLS – certificate-based authentication without MSCHAP.

Specification: RFC 5281

Main Features:

  • Uses EAP-TTLS to create a secure TLS tunnel and performs PAP (Password Authentication Protocol) inside it.

  • Sends username and password in clear text within the TLS tunnel, providing confidentiality.

  • Simple and widely supported; easy to implement on client and server sides.

  • No need for client-side certificates.

  • Good balance between security and ease of deployment.

Use Cases:

  • Campus or enterprise Wi-Fi environments where simplicity is prioritized.

  • Legacy systems or lightweight clients that can’t support more complex EAP methods.

  • Environments with internal RADIUS infrastructure supporting PAP inside secure tunnels.

  • Situations requiring minimal configuration on endpoints.

Alternative Protocols:

  • EAP-TTLS-CHAP – stronger than PAP, but similar architecture.

  • EAP-PEAP-MS-CHAPv2 – Microsoft-oriented tunnel-based EAP method.

  • EAP-TTLS-MS-CHAPv2 – more secure alternative to PAP using a tunneled version of MSCHAPv2.

  • EAP-TLS – uses client certificates, offering higher security.

Specification: RFC 5281

Main Features:

  • Uses EAP-TTLS to establish a secure TLS tunnel and performs CHAP (Challenge Handshake Authentication Protocol) inside it.

  • Provides improved security over PAP by avoiding transmission of plaintext passwords, even within the tunnel.

  • Still does not require client-side certificates, simplifying deployment.

  • Ensures authentication of the server via TLS certificates.

  • Suitable when backward compatibility with legacy CHAP-based systems is needed.

Use Cases:

  • Enterprise Wi-Fi authentication where legacy CHAP-based identity stores are in use.

  • Environments with RADIUS servers supporting CHAP authentication inside secure tunnels.

  • Network scenarios where EAP-TTLS-PAP is not acceptable due to its plaintext password usage (even inside TLS).

Alternative Protocols:

  • EAP-TTLS-PAP – simpler, but sends password in plaintext inside TLS.

  • EAP-TTLS-MS-CHAPv2 – more secure than CHAP, widely supported.

  • EAP-PEAP-MS-CHAPv2 – Microsoft-friendly method using PEAP tunneling.

  • EAP-TLS – highest security using mutual certificates.

Specification: RFC 4186

Main Features:

  • Uses the SIM (Subscriber Identity Module) from GSM networks for authentication.

  • Enables mutual authentication and session key generation between the user and network.

  • Does not require user-entered credentials—uses SIM card securely instead.

  • Vulnerability to man-in-the-middle attacks mitigated via optional server certificate validation.

  • Operates within existing EAP framework and integrates with RADIUS/AAA infrastructure.

Use Cases:

  • Secure Wi-Fi access using SIM credentials (e.g., 802.1X in mobile networks).

  • Seamless authentication in cellular offload scenarios (e.g., Wi-Fi Hotspot 2.0).

  • Carrier Wi-Fi deployments and mobile network authentication extensions.

  • Smart devices with embedded SIMs requiring minimal user interaction.

Alternative Protocols:

  • EAP-AKA – 3G/UMTS equivalent of EAP-SIM, more advanced.

  • EAP-AKA’ (AKA-Prime) – LTE/5G-compatible, with stronger security guarantees.

  • EAP-TLS – Certificate-based, suitable for non-SIM devices.

  • EAP-PEAP – Tunnel-based credential exchange.

Specification: RFC 4187

Main Features:

  • Uses the AKA (Authentication and Key Agreement) mechanism from 3G/UMTS networks.

  • Provides mutual authentication and session key derivation between client and server.

  • Designed for devices with USIM (Universal Subscriber Identity Module).

  • Supports identity privacy (temporary identities) and re-authentication.

  • Resistant to replay and man-in-the-middle attacks.

Use Cases:

  • Wi-Fi authentication using mobile network credentials (e.g., Hotspot 2.0, Wi-Fi offloading).

  • Telecom environments with 3GPP authentication infrastructure.

  • SIM-based device authentication in enterprise or campus networks.

  • Seamless authentication for mobile subscribers.

Alternative Protocols:

  • EAP-SIM – For 2G (GSM) networks.

  • EAP-AKA’ (AKA-Prime) – LTE/5G-focused, with improved security.

  • EAP-TLS – Non-SIM devices with certificate-based authentication.

  • EAP-PEAP – Tunnel-based, credential-based authentication.

Specification: RFC 5448

Main Features:

  • An enhanced version of EAP-AKA designed for LTE and 5G networks.

  • Provides stronger cryptographic algorithms and improved privacy protections.

  • Supports key derivation for secure session establishment.

  • Includes mechanisms to resist active and passive attacks.

  • Maintains backward compatibility with EAP-AKA.

Use Cases:

  • Authentication in LTE and 5G cellular networks.

  • Wi-Fi offloading with improved security.

  • Mobile devices using USIM with LTE/5G capabilities.

  • Enterprise and carrier-grade network access control.

Alternative Protocols:

  • EAP-AKA – Predecessor for 3G networks.

  • EAP-TLS – Certificate-based authentication.

  • EAP-PEAP – Tunnel-based password or certificate authentication.

  • EAP-SIM – For 2G GSM network devices.

Specification: RFC 4742

Main Features:

  • Password-based authentication protocol designed to provide mutual authentication.

  • Uses strong cryptographic primitives to resist dictionary attacks.

  • Establishes a secure key between client and server after authentication.

  • Does not require certificates or public key infrastructure (PKI).

  • Suitable for environments with limited resources.

Use Cases:

  • Wireless networks requiring password-based authentication without certificates.

  • Small office or home networks with minimal security infrastructure.

  • Situations where mutual authentication is desired but PKI is unavailable.

  • Legacy systems supporting password authentication.

Alternative Protocols:

  • EAP-PEAP – Uses TLS tunnel for password authentication.

  • EAP-TTLS – Tunnel-based password or legacy authentication methods.

  • EAP-SAKE – Similar password-based mutual authentication protocol.

  • EAP-TLS – Certificate-based mutual authentication.

Specification: RFC 4764

Main Features:

  • Uses pre-shared keys (PSK) for mutual authentication.

  • Provides secure key exchange without requiring certificates.

  • Designed for low-complexity devices and environments.

  • Resistant to dictionary attacks and man-in-the-middle attacks.

  • Establishes fresh session keys for encryption after authentication.

Use Cases:

  • Wireless networks where deploying certificates is impractical.

  • IoT devices with limited computational power.

  • Small-scale or private networks relying on shared secrets.

  • Situations requiring fast and secure authentication without PKI.

Alternative Protocols:

  • EAP-PAX – Password-based mutual authentication alternative.

  • EAP-TLS – Certificate-based authentication for higher security.

  • EAP-PEAP – Uses TLS tunnel for password authentication.

  • EAP-TTLS – Tunnel-based password or legacy authentication.

Specification: RFC 4763

Main Features:

  • Stands for “Shared Secret Authentication and Key Establishment.”

  • Uses symmetric key cryptography for mutual authentication.

  • Provides key establishment and fresh session keys for encryption.

  • Designed to be resistant to dictionary and replay attacks.

  • Suitable for wireless networks with pre-shared secrets.

  • Does not require public key infrastructure (PKI).

Use Cases:

  • Wireless LANs where pre-shared secrets are used.

  • Environments without a PKI or certificate infrastructure.

  • Low-power or legacy devices requiring secure authentication.

  • Enterprise and private networks focusing on lightweight security.

Alternative Protocols:

  • EAP-PSK – Another symmetric key-based authentication method.

  • EAP-TLS – Certificate-based strong authentication.

  • EAP-PEAP – Tunnel-based authentication with passwords.

  • EAP-TTLS – Tunnel-based authentication supporting multiple inner methods.

Specification: RFC 4851

Main Features:

  • Stands for Flexible Authentication via Secure Tunneling.

  • Uses Protected Access Credential (PAC) to establish a secure tunnel.

  • Supports mutual authentication and session key generation.

  • Designed to be a lightweight alternative to EAP-TLS without requiring client certificates.

  • Can operate in both tunneled and non-tunneled modes.

  • Resilient against dictionary and man-in-the-middle attacks.

Use Cases:

  • Enterprise wireless networks requiring strong security but without client certificates.

  • Environments where legacy devices need compatibility with modern authentication.

  • Networks that deploy centralized authentication with RADIUS servers.

  • Situations requiring flexible authentication methods with secure tunnels.

Alternative Protocols:

  • EAP-TLS – Certificate-based mutual authentication.

  • EAP-PEAP – Password-based tunnel authentication.

  • EAP-TTLS – Tunnel-based authentication supporting multiple inner methods.

  • EAP-SIM / EAP-AKA – For mobile and cellular network authentication.

Specification: RFC 5106

Main Features:

  • Extends the Internet Key Exchange version 2 (IKEv2) protocol for EAP.

  • Provides mutual authentication and key exchange in a secure manner.

  • Uses strong cryptographic algorithms to ensure confidentiality and integrity.

  • Supports various authentication methods inside the IKEv2 framework.

  • Designed for environments requiring robust security, such as VPNs and enterprise networks.

  • Provides seamless key management and fast re-authentication.

Use Cases:

  • VPN client authentication with strong mutual authentication.

  • Enterprise wireless networks requiring high security.

  • Environments where integration with IPsec is desired.

  • Situations needing fast and secure session establishment.

Alternative Protocols:

  • EAP-TLS – certificate-based authentication.

  • EAP-FAST – lightweight tunnel-based authentication.

  • EAP-PEAP – password-based tunneled authentication.

  • EAP-TTLS – flexible tunnel supporting multiple inner methods.

Specification: RFC 5433

Main Features:

  • Extends EAP with pre-shared key (PSK) based authentication.

  • Provides mutual authentication using shared keys.

  • Lightweight and efficient for constrained environments.

  • Offers protection against replay and man-in-the-middle attacks.

  • Designed for scenarios where certificates are not feasible.

  • Uses cryptographic key derivation to generate session keys.

Use Cases:

  • Wireless networks with pre-shared keys.

  • IoT devices with limited processing capabilities.

  • Environments where simple key management is preferred.

  • Secure authentication without complex PKI infrastructure.

Alternative Protocols:

  • EAP-TLS – certificate-based authentication.

  • EAP-PSK – more general pre-shared key based EAP.

  • EAP-MD5 – simple challenge-response authentication.

  • EAP-GTC – generic token card authentication.

Specification: RFC 3748 (original EAP), RFC 1994 (CHAP)

Main Features:

  • Simple challenge-response authentication using MD5 hash.

  • One-way authentication of the client to the server.

  • Does not provide mutual authentication.

  • Vulnerable to replay and dictionary attacks.

  • Fast and minimal overhead.

  • Widely supported but considered insecure for modern networks.

Use Cases:

  • Legacy systems requiring simple authentication.

  • Environments where minimal security is acceptable.

  • Testing and lab environments.

  • Use cases without need for confidentiality or mutual trust.

Alternative Protocols:

  • EAP-TLS – strong certificate-based mutual authentication.

  • EAP-MS-CHAPv2 – improved challenge-response with mutual auth.

  • EAP-GTC – token-based authentication.

  • EAP-PEAP – tunneled password-based authentication.

Specification: RFC 2759

Main Features:

  • Challenge-handshake authentication protocol v2, integrated into EAP.

  • Provides mutual authentication between client and server.

  • Uses MS-CHAPv2 for password-based authentication.

  • Supports key derivation for encryption of subsequent sessions.

  • Vulnerable to offline password guessing if weak passwords are used.

  • Commonly used in VPNs and Microsoft environments.

Use Cases:

  • VPN user authentication.

  • Microsoft Active Directory integrated networks.

  • Wireless networks requiring password-based authentication.

  • Environments where legacy MS-CHAP support is needed.

Alternative Protocols:

  • EAP-TLS – certificate-based strong authentication.

  • EAP-PEAP – tunneled password authentication with MS-CHAPv2.

  • EAP-GTC – token-based generic authentication.

  • EAP-MD5 – simpler but weaker challenge-response.

Specification: RFC 3748 (EAP), RFC 4851

Main Features:

  • Generic Token Card protocol for EAP.

  • Allows passing of arbitrary authentication tokens (e.g., OTPs).

  • Supports challenge-response mechanisms.

  • Simple, flexible, and extensible.

  • Often used with one-time passwords or token-based authentication.

  • Does not provide encryption itself, relies on underlying secure transport.

Use Cases:

  • Token card based authentication systems.

  • Integration with hardware tokens and OTP devices.

  • Environments needing flexible authentication methods.

  • Systems supporting multiple authentication tokens.

Alternative Protocols:

  • EAP-TLS – certificate-based strong authentication.

  • EAP-PEAP – tunneled password authentication.

  • EAP-MS-CHAPv2 – password-based mutual authentication.

  • EAP-GPSK – pre-shared key based lightweight authentication.

Specification: RFC 5792

Main Features:

  • Trusted Network Connect (TNC) extension for EAP.

  • Provides endpoint integrity assessment and network access control.

  • Supports posture validation before network access.

  • Can carry vendor-specific integrity data.

  • Designed for environments requiring endpoint security checks.

  • Integrates with policy enforcement systems.

Use Cases:

  • Network access control (NAC) deployments.

  • Enterprise networks enforcing endpoint compliance.

  • Environments requiring dynamic security posture checks.

  • Systems needing vendor-specific integrity measurements.

Alternative Protocols:

  • EAP-TLS – certificate-based authentication.

  • EAP-FAST – fast tunnel-based authentication.

  • EAP-PEAP – tunneled password authentication.

  • EAP-GTC – token card based authentication.

RFC / Specification: No specific RFC; implementation varies by vendor and OTP system

Main Features:

  • Uses One-Time Password (OTP) tokens for authentication

  • Provides dynamic password-based authentication, reducing risks of password reuse

  • Typically combined with a TLS tunnel (like PEAP or TTLS) for secure transport

  • Strong protection against replay and phishing attacks due to OTP use

  • Requires backend OTP server or infrastructure for verification

Use Cases:

  • Secure wireless access requiring two-factor or dynamic authentication

  • VPN authentication using OTP tokens for added security

  • Environments demanding stronger security than static passwords

Alternative Protocols:

  • EAP-PEAP/OTP – OTP authentication inside a TLS tunnel with server certificate verification

  • EAP-TTLS/EAP-OTP – Flexible inner authentication with OTP inside a secure TLS tunnel

  • EAP-TLS – Certificate-based mutual authentication for highest security

  • EAP-MSCHAPv2 – Password-based authentication, less secure than OTP or cert-based methods

RFC / Specification: RFC 4851 (PEAP) + vendor-specific OTP extensions

Main Features:

  • Encapsulates OTP authentication inside a TLS tunnel secured by server certificates

  • Protects OTP credentials from interception and replay attacks

  • Provides strong server authentication and client authentication via OTP

  • Commonly used with backend OTP authentication servers

  • Supports flexible OTP mechanisms (hardware tokens, software tokens, SMS OTP)

Use Cases:

  • Enterprise wireless networks requiring strong two-factor authentication

  • VPN access where OTP is combined with TLS protection

  • Environments demanding protection of dynamic credentials over insecure networks

Alternative Protocols:

  • EAP-TTLS/EAP-OTP – Similar TLS tunnel with flexible inner authentication using OTP

  • EAP-TLS – Certificate-based mutual authentication, no passwords or OTP needed

  • EAP-OTP – OTP without TLS tunnel (less secure)

  • EAP-MSCHAPv2 – Password-based authentication, less secure compared to OTP

RFC / Specification: RFC 5281 (TTLS) + vendor-specific OTP extensions

Main Features:

  • Establishes a secure TLS tunnel with server certificate authentication

  • Supports flexible inner authentication methods, including OTP for client authentication

  • Protects OTP credentials inside the encrypted tunnel to prevent interception

  • Allows legacy password protocols and OTP to be used securely

  • Requires backend OTP server infrastructure for verification

Use Cases:

  • Enterprise wireless and VPN networks needing secure OTP authentication

  • Environments with mixed authentication requirements (passwords, OTP)

  • Networks requiring strong server validation and dynamic client authentication

Alternative Protocols:

  • EAP-PEAP/OTP – OTP inside a TLS tunnel with server cert validation

  • EAP-TLS – Full certificate-based mutual authentication without passwords

  • EAP-OTP – OTP authentication without TLS tunnel (less secure)

  • EAP-MSCHAPv2 – Password-based authentication, less secure than OTP

RFC / Specification: Cisco proprietary (no formal RFC)

Main Features:

  • Password-based mutual authentication using MS-CHAP

  • Simple and easy to deploy but vulnerable to dictionary and brute-force attacks

  • No certificate support or TLS tunneling

  • Primarily designed for Cisco wireless networks

  • Considered deprecated due to security weaknesses

Use Cases:

  • Legacy Cisco wireless networks

  • Environments where backward compatibility with older Cisco devices is required

  • Not recommended for new deployments due to security risks

Alternative Protocols:

  • EAP-TLS – Strong certificate-based authentication

  • EAP-PEAP – TLS tunnel with password or OTP authentication

  • EAP-TTLS – Flexible TLS tunnel with various inner methods

  • EAP-OTP – Dynamic password authentication using one-time passwords

RFC / Specification: RFC 6124

Main Features:

  • Provides mutual authentication using password-authenticated key exchange

  • No need for certificates or pre-shared keys

  • Uses encryption and zero-knowledge techniques to protect passwords from offline dictionary attacks

  • Establishes a shared secret (PMK) securely between client and server

  • Designed to be resistant to passive and active attacks

  • Suitable for environments where lightweight but secure authentication is required

Use Cases:

  • Enterprise Wi-Fi networks without a Public Key Infrastructure (PKI)

  • VPN authentication using password-only mechanisms

  • Secure IoT device onboarding with minimal resource usage

  • Systems requiring strong password-only authentication with protection against replay and dictionary attacks

Alternative Protocols:

  • EAP-PWD – Also offers secure mutual authentication without certificates

  • EAP-TLS – Certificate-based, stronger but more complex setup

  • EAP-PEAP – Tunnel-based with password inside TLS

  • EAP-PAX – Lightweight password-based mutual authentication

RFC / Specification: RFC 5931

Main Features:

  • Performs mutual authentication using password-based elliptic curve cryptography

  • Does not require certificates or external infrastructure

  • Resistant to dictionary attacks and replay attacks

  • Uses zero-knowledge proof to verify shared secrets

  • Secure and efficient for environments without PKI

  • Fully integrated into the EAP framework; supported by FreeRADIUS and hostapd

Use Cases:

  • Secure wireless (WPA2/WPA3-Enterprise) environments without certificate infrastructure

  • Environments requiring lightweight, strong password-only authentication

  • IoT or embedded devices where certificate handling is complex

  • Integration with FreeRADIUS or hostapd for enterprise Wi-Fi

Alternative Protocols:

  • EAP-TLS – Certificate-based mutual authentication

  • EAP-PEAP – TLS tunnel with inner password/token methods

  • EAP-TTLS – TLS-based tunneling for multiple inner methods

  • EAP-EKE – Similar certificate-less password-authentication with key exchange