What is wide-mouth frog?

Answers were Sorted based on User's Feedback



What is wide-mouth frog?..

Answer / jitendra

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading

Is This Answer Correct ?    6 Yes 1 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router

1 Answers  


Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router

1 Answers  


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time

2 Answers  


The command 'debug ip rip' will do which of the following? A.) Show Neighbor Info. B.) Display RIP routing updates. C.) Show routing table changes. D.) Show all IP traffic. E.) This is not a valid router command. F.) Cause the router to respond with 'Ambiguous command'

1 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

2 Answers  






Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup

1 Answers  


Which company mange ip's?

0 Answers  


Hi Anyone can share the latest ICND1 (640-822)dumps updated at 30 september 2009. specialy to Jatendra if you have any updated about the ICND1 exam.will be remain thankful.

2 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  


Identify the command that displays traffic statistics on serial0/1? A.) display interface serial0/1 B.) show interface serial0/1 C.) show seria0/1 stats D.) show interface serial0/1 stats

1 Answers  


What is the function of application layer in networking?

0 Answers  


Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.

2 Answers  


Categories