What is wide-mouth frog?

Answer Posted / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we update the IOS version with the help of TFTP?

1536


Can you give an overview of various components in IPSec?

1950


What is subnetting? Why is it used?

680


What is the difference between switch and hub?

637


What are the differnt memory use in cisco router?

624






What will be the prefix length of 224 in vlsm?

645


Do we subletting of ip?

714


Can you explain L2TP?

1625


Explain what is formula of hold down time of eigrp protocol?

574


What are the types of communication in ipv6 ?

606


What is mtu and what is its size for transmission?

659


Mention the ranges for the private IP?

667


What is STP and what is the difference between PVST and RSTP

2515


Does a bridge divide a network into smaller sections?

610


Which command we give if router ios stucked?

629