What is wide-mouth frog?

Answer Posted / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between switch, routers, and hub?

885


Can yo define LNS

2142


Explain what is the default behavior of access-list?

763


hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha

1982


Explain how many types of ends in wan?

844


What is the difference among straight cable, cross cable and rollover cable?

844


What is the point-to-point protocol in ccna?

855


After how long eigrp protocol advertise its routing table?

806


which defined peer ip address an local subnet belong to crete? (Choose two)

852


What is the terminal emulation?

827


What is segmentation and fragmentation?

967


What is ad in ccna?

888


What is the passive topology in ccna?

883


What does data packets consist of?

813


What is the maximum request timer?

828