What is wide-mouth frog?
Answers were Sorted based on User's Feedback
Answer / jitendra
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading
| Is This Answer Correct ? | 6 Yes | 1 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 1 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
Hi Guys i hv one confusion. Need u peoples help. In EIGRP, maximum hop count is up to 255. By default only 100. Now question is - a) Suppose i hv a network consist of 115 routers & EIGRP routing protocol is configured. By default hop count is 100, so is there any manual configuration necessary for hop count ya router will automatically detect the hop count & will update the hop count accordingly..????? b) In EIGRP, Bandwidth & Delay is used to calculate metric. For this Metric weight is set to K1(Bandwidth)=1, K2(Delay)=0, K3(Reliability)=1, K4(Load)=0, K5(MTU)=0 Now i want, Bandwidth & Load is used to calculate metric. For that wat i hv to configure & wat wub the metric weights. Cud anyone explain it plzzzz..!!!!
What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and passive interfaces configured on a router?
How do you view the routers current processor utilization? A.) show version B.) show processes cpu C.) show running-config D.) show startup-config E.) show cpu F.) show utilization
Hello Mr.Jitendera Kuamr Sinha, how is every thing going on? Thanks for your reply. Dear Friend if you can Explain it little bit deeper i will be realy thanks full. Wish you all the Best.
What are four ways that Fast Ethernet compares to 10BaseT Ethernet? (Choose four) A. Fast Ethernet uses the same Maximum Transmission Unit (MTU) B. Fast Ethernet is based on an extension to the IEEE 802.3 specification C. Fast Ethernet uses the same Media Access Control (MAC) mechanisms D. Fast Ethernet preserves the frame format that is used by 10BaseT Ethernet E. Fast Ethernet errors a speed increase one hundred times that of the 10BaseT Ethernet
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
What’s the simplest way to remotely configure a router?
When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents
Tell me CCNA Course + Dump Q/A in chennai?
Why we use filter option?
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec