Answer Posted / gtech
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is the matric of EIGRP protocol?
Differentiate Logical Topology from Physical Topology
Explain the difference between baseband and broadband transmission in ccna?
Explain how many maximum paths you can give on latest ios in rip?
Mention the conversion steps of data encapsulation?
Which defined peer ip address an local subnet belong to crete?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
what's the difference between Symmetric and Asymmetric cryptosystem?
When we use extended access-list?
If bandwidth will increase what will happen?
How does RIP differ from IGRP?
When we use router?
Explain how an spf algorithm works?
What is the difference between hub, switch, and router?
Can you explain in a generic manner the packet of IPSec?