Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is wide-mouth frog?

Answer Posted / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which ipsec rule is used for the olympia branch and what does it define? (Choose two)

1111


What is the difference between the user mode and the privileged mode?

1149


Which ipsec rule is used for the olympia branch and what does it define?

1100


What is STP and what is the difference between PVST and RSTP

2990


What is the name of algorithm of eigrp protocol?

1133


Explain the difference between named and extended acl?

1096


On which bas ospf take decision?

1108


What are the types of resource sharing?

1171


Why is distributed processing useful?

1117


What cable called v.35?

1065


Explain the draw back of ospf protocol?

1032


How is private ip different from public ip?

1027


After how long keep alive messages exchange in eigrp?

1044


Explain the types of nat?

1161


What is the usage of service password encryption?

1317