What is wide-mouth frog?

Answers were Sorted based on User's Feedback



What is wide-mouth frog?..

Answer / jitendra

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading

Is This Answer Correct ?    6 Yes 1 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Mention what is the difference between the switch, hub, and router?

0 Answers  


What is the difference between dynamic ip and static ip addressing?

0 Answers  


What is mtu and what is its size for transmission?

0 Answers  


Q1> Which are the ports on CISCO Device? Q2> If our links are down then what we suppose to check? Steps? Q3> This is the ip address x.x.y.y/27 then what is the subnet mask? Q4> What do you mean by Static and Dynamic routing? Give Example of each? Q5> Suppose there are two routers i.e. Router A and Router B and if they are connected on P2P N/w, Then how to configure the router?or Which are the components of router? Q6> This is the ip address x.x.y.y/24 then what is the subnet mask? Q7> There are 4 departments and 10,000 pc's are their so how many vlans are created ? Q8> what is the number of standard vlan creation? Options Prasad Saldur hey guys any openings in mumbai i am fresher i finished my BSC -IT in the year 2011 if any opening please let me know..Like · · Follow Post · July 11 at 10:41am Options Mayank Shah pls any one send me the latest dumps of ccna my email addr is mayankshah20089@gmail.comLike · · Follow Post · July 10 at 1:49am Options Gupta Manoj Any idea About Wipro Telephonic Round for Network Engg?Like · · Unfollow Post · July 9 at 10:35pm Options Gupta Manoj What is mean by Catalyst Switch?Like · · Unfollow Post · July 9 at 6:28am Mohd Yaseen Catalyst Switch is the series which is launched by Cisco and it also awarded my many times becoz of its flexibily and technology..Example of Catalyst Swict r :- 1700 1800 2900 July 9 at 8:47am · Like Options Sheelgandh Chandankhede Extensive use of GRE tunnels ? Function of GRE tunnels?Like · · Follow Post · July 7 at 6:15am Options Gupta Manoj Wheather this is Good Company or Not Firstsource Solutions Ltd i Got selected for NOC Engg sholud i join or not?Like · · Unfollow Post · July 3 at 11:19pm Mohd Yaseen BHai No Idea,,,,I Think u Should go for Review.......... July 5 at 2:00am · Like Kapil Mhatre Salary? & location? July 6 at 10:44am via mobile · Like · 1 Options Somil Keswani Attachment Unavailable This attachment may have been removed or the person who shared it may not have permission to share it with you.Like · · Follow Post · July 6 at 10:40am Options Gupta Manoj Baap Se Bapadaaaaaaaaaaaaaaaaaaaaaaaaa​aaaLike · · Unfollow Post · July 6 at 10:16am Mohd Yaseen and Shrikant Shitole like this. Options Chintan Shah friends tell me how to make two internet lines work on same switch without cisco routerLike · · Follow Post · July 1 at 11:32pm near Mumbai Options Suhas Salunkhe What is the difference between Alternate and Backup port in RSTP ?Like · · Follow Post · July 1 at 12:41pm Options Gupta Manoj Practical Question Suppose there is 1 switch and on Switch at port 1 Hub is connected and on hub port 2 and 3 Computer 1 and Computer 2 is connected? Then How many MAC learn at switch1?Like · · Unfollow Post · June 28 at 1:56am Vinod Kumar Vishwakarma At this stage i think 2 July 1 at 9:04am · Like Gupta Manoj Manageable cisco switch July 1 at 9:24am · Like · 1 Options Yogesh Dilip Lotlikar Like · · Follow Post · July 1 at 8:18am Shrikant Shitole and 2 others like this. Options Somil Keswani Wall Photos Disaster recovery illustrated :D The best difference between all of them. Share it if you liked it. :) By: UNISOFT TECHNOLOGIES Like · · Follow Post · July 1 at 8:12am Options Gupta Manoj In windows 2000 if we want to take a remote axcess then which command is used? http://192.168.0.1/ 192.168.0.1Like · · Unfollow Post · Share · June 28 at 2:00am Mohd Yaseen sorry June 29 at 4:27am · Like Gupta Manoj what are u giving the ans man? July 1 at 6:08am · Like Options Gupta Manoj Switch works on which layer?Like · · Unfollow Post · June 28 at 2:01am Gaurav Dhargalkar L2 switch on layer 2 and L3 switch works on layer 3 after command:no switchport (acts as router) July 1 at 12:06am · Like · 2 Amar Chavan good question July 1 at 1:59am · Like · 1 Options Gupta Manoj What is the Default priority of STP?Like · · Unfollow Post · June 28 at 2:01am Mohd Yaseen sorry June 29 at 4:32am · Like Gaurav Dhargalkar ‎32768 July 1 at 12:04am · Like Options Gupta Manoj ‎1>What is Triple X Network? 2>What is 5 4 3 Rule? 3>Difference between BIT Rate and Boud Rate?Like · · Unfollow Post · June 27 at 10:07am Gaurav Dhargalkar bhai log itna tension kyu lete ho google is baap of knowledge u will get info on any query u want. just u have to search deep for easy explainations. July 1 at 12:00am · Like Gaurav Dhargalkar For all the alsi ppl. Enjoy :) 1.http://​www.allinterview.com/​showanswers/13964.html 2.http://www.webopedia.com/​TERM/5/5_4_3_rule.html 3. http://www.tech-faq.com/​difference-between-bit-rate​ -and-baud-rate.htmlWhat do you meant by "triple X" in Networks? www.allinterview.com What do you meant by "triple X" in Networks? Interview Questions July 1 at 12:03am · Like · 1 Options Gupta Manoj Q>If we want to learn the Neigbours IP address then which command is used? a>show cdp neighbours b>show run c>show cdp networks d>show ip routeLike · · Unfollow Post · June 28 at 2:05am Vishal Duraphe always welcomed yaar !! June 29 at 7:35am · Like Gaurav Dhargalkar show cdp will be shown if cdp is enabled. But in real-time designs it is not usually enabled. Whereas in sh run u will all info and config on the router where the neighbours are also published. June 30 at 11:58pm · Like Options Gupta Manoj Practical Question Suppose there is 1 switch and on Switch at port 1 Hub is connected and on hub port 2 and 3 Computer 1 and Computer 2 is connected? Then How many MAC learn at switch1?Like · · Unfollow Post · June 29 at 4:33am Options Gupta Manoj What is the resposibility of Network Layer?Like · · Unfollow Post · June 28 at 2:02am Mohd Yaseen Responsibility to learn all routes and place best route in a RoutingTable and do routes filteration through ACL June 29 at 4:31am · Like Options Older Posts Facebook © 2012 · English (US) About · Create an Ad · Create a Page · Developers · Careers · Privacy · Cookies · Terms · Help Abhi Singh 1

1 Answers  


After the command -- router igrp 200 -- what command would enable IGRP on the router for interface E0, with an address of 157.89.4.4 and a mask of 255.255.255.0 ? A.) network 157.89.4.0 255.255.255.1 B.) network 157.89.0.0 C.) router igrp * D.) router igrp 157.89.0.1 E.) router igrp int e1 F.) router igrp 157.89.4.1

2 Answers  






Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


Can you explain CHAP?

1 Answers   CCIE,


Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp

2 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

1 Answers  


what is the difference between 1 router and switch 2 router and hub 3 hub and switch 4 bridge and switch

1 Answers   Hathway,


What is default cost of serial interface in ospf?

0 Answers  


What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?

20 Answers   IBM,


Categories