What is wide-mouth frog?
Answers were Sorted based on User's Feedback
Answer / jitendra
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading
Is This Answer Correct ? | 6 Yes | 1 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
Is This Answer Correct ? | 1 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
Is This Answer Correct ? | 0 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
Is This Answer Correct ? | 0 Yes | 0 No |
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
In port based access-list which command u give instead of ip?
What is the difference between simple authentication and md5?
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
Which encapsulation methods are most commonly used with dialup Integrated Services Digital Network (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC
After how long keep alive messages exchange in eigrp?
What is syntax of ipv4?
Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#
Which statement about the Committed Information Rate (CIP) is true? A. It is the rate in bits per second at which the Frame Relay switch agrees to transfer data B. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that switch can transferduring any Committed Rate Measurement Interval D. It is a signaling standard between the 3PE device and FP switch. It is responsible for managing the connection and maintaining status between the devices.
Which element is used to define the rate in bits per second that a Frame Relay switch agrees to transfer data? A. clock rate (CP) B. Committed Information Rate (CIR) C. Local Management Interface (LMI) D. data link connection identifier (DICI) E. Committed Rate Measurement Intercal (CRIMI)
what is the network address?
An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only