What is wide-mouth frog?
Answers were Sorted based on User's Feedback
Answer / jitendra
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading
| Is This Answer Correct ? | 6 Yes | 1 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 1 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
Explain how an spf algorithm works?
Why twist in twisted pairs?
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
With distance vector routing protocols, it is never useful to send the same routing update packet back out the same interface that it was learned. This concept is called what? A.) Holddown timers B.) Poison Reverse C.) Count to infinity D.) Split Horizon E.) Link State
what is the main features of link state routing protocols?
The network portion of an address typically represents a: A.) Router B.) Ethernet MAC address. C.) Computer D.) Host E.) Segment
What is a protocol
Can anybody tell me how to configure a cisco router?
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
Which service takes information from multiple sources and allocates bandwidth on a single media? A. Time-division Multiplexing (TDM) B. Signaling System 7 (SS7) C. X.25 D. Frame relay
To which layer ICMP belongs
Name the command we give if router ios stucked?