What is wide-mouth frog?
Answers were Sorted based on User's Feedback
Answer / jitendra
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading
| Is This Answer Correct ? | 6 Yes | 1 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 1 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
What is wide-mouth frog?
Identify the default serial encapsulation? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup
Which configuration task must you complete if a remote Frame Relay router does NOT support Inverse APP? A.configure static maps B.define an IP address locally C.disable DHCP on the Frame Relay router D.configure a static route to the remote network
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp
In eigrp metric parameters which 2 options are enable by default?
What is a protocol
When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90
Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table