What is wide-mouth frog?

Answer Posted / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Mention what does the clock rate do?

727


What is cam?

687


Value in which type of access list?

652


Name the command we give for see routing table?

1940


Tell me which protocol called rapid protocol?

590






What are the steps of data encapsulation?

680


What is a switch and why we are using switches?

627


What’s the simplest way to remotely configure a router?

649


What is the difference between bus topology and hub?

653


Explain the benefits of VLANs.

674


Explain the difference between flsm and vlsm?

768


What is the difference between switch and hub?

637


Tell me when we use extended access-list?

1041


What is topology in ccna?

748


Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...

1671