Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is wide-mouth frog?

Answer Posted / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain encapsulating, carrier and passenger protocol?

2400


Define ios?

1087


Which defined peer ip address an local subnet belong to crete?

1194


What command do we give if router IOS is stuck?

1685


Tell me which cable we connect in db-9?

1074


Which protocol works only on cisco routers?

1169


What is formula of hold down time of eigrp protocol?

1215


Explain why is udp lease favored when compared to tcp?

1172


Utilizing RIP, what is the limit when it comes to number of hops?

1386


What are the differnt memory use in cisco router?

1145


which points are eliminated by the DBSCAN algorithm?

2124


What is the mac address?

1204


What is the difference between csma/ca?

1159


Explain the major types of networks and explain?

1194


i have donE B.E. IN COMPUTER SCIENCE AND THEN CCNA CERTIFICATOIN PLEASW LET ME KNOW IF ANY COMPANIES R HIRING FRESHERS PLEASE REPLY ON MY EMAIL ID karnailthakur@gmail.com

2753