<s>
Lightweight	B-Protocol
Extensible	I-Protocol
Authentication	I-Protocol
Protocol	I-Protocol
(	O
LEAP	B-Protocol
)	O
is	O
a	O
proprietary	O
wireless	O
LAN	O
authentication	O
method	O
developed	O
by	O
Cisco	O
Systems	O
.	O
</s>
<s>
Important	O
features	O
of	O
LEAP	B-Protocol
are	O
dynamic	O
WEP	B-Protocol
keys	I-Protocol
and	O
mutual	O
authentication	O
(	O
between	O
a	O
wireless	O
client	O
and	O
a	O
RADIUS	B-Protocol
server	I-Protocol
)	O
.	O
</s>
<s>
LEAP	B-Protocol
allows	O
for	O
clients	O
to	O
re-authenticate	O
frequently	O
;	O
upon	O
each	O
successful	O
authentication	O
,	O
the	O
clients	O
acquire	O
a	O
new	O
WEP	B-Protocol
key	I-Protocol
(	O
with	O
the	O
hope	O
that	O
the	O
WEP	B-Protocol
keys	I-Protocol
do	O
n't	O
live	O
long	O
enough	O
to	O
be	O
cracked	O
)	O
.	O
</s>
<s>
LEAP	B-Protocol
may	O
be	O
configured	O
to	O
use	O
TKIP	O
instead	O
of	O
dynamic	O
WEP	B-Protocol
.	O
</s>
<s>
Some	O
3rd	O
party	O
vendors	O
also	O
support	O
LEAP	B-Protocol
through	O
the	O
Cisco	O
Compatible	O
Extensions	O
Program	O
.	O
</s>
<s>
Cisco	O
LEAP	B-Protocol
,	O
similar	O
to	O
WEP	B-Protocol
,	O
has	O
had	O
well-known	O
security	O
weaknesses	O
since	O
2003	O
involving	O
offline	O
password	O
cracking	O
.	O
</s>
<s>
LEAP	B-Protocol
uses	O
a	O
modified	O
version	O
of	O
MS-CHAP	B-Algorithm
,	O
an	O
authentication	O
protocol	O
in	O
which	O
user	O
credentials	O
are	O
not	O
strongly	O
protected	O
.	O
</s>
<s>
Cisco	O
's	O
response	O
to	O
the	O
weaknesses	O
of	O
LEAP	B-Protocol
suggests	O
that	O
network	O
administrators	O
either	O
force	O
users	O
to	O
have	O
stronger	O
,	O
more	O
complicated	O
passwords	O
or	O
move	O
to	O
another	O
authentication	O
protocol	O
also	O
developed	O
by	O
Cisco	O
,	O
EAP-FAST	O
,	O
to	O
ensure	O
security	O
.	O
</s>
<s>
Automated	O
tools	O
like	O
ASLEAP	O
demonstrate	O
the	O
simplicity	O
of	O
getting	O
unauthorized	O
access	O
in	O
networks	O
protected	O
by	O
LEAP	B-Protocol
implementations	O
.	O
</s>
