Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is wide-mouth frog?

Answers were Sorted based on User's Feedback



What is wide-mouth frog?..

Answer / jitendra

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to
each other while also preventing eavesdropping or replay
attacks, and provides for detection of modification and the
prevention of unauthorized reading

Is This Answer Correct ?    6 Yes 1 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    1 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

What is wide-mouth frog?..

Answer / gtech

The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........

This can be proven using BAN logic.

The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}

Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.

The protocol has several problems:

* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.

------- :)---------

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

A user device that connects to a DCE must be which of the following? A.) DTE B.) CPE C.) Demarc D.) DCE E.) CO

1 Answers  


How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode

3 Answers   Cisco, HCL,


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time

2 Answers  


What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services

3 Answers  


Operation of two PC connecting with brand new switches. (they expecting step by step arp ,broadcast,MAC table, RARP operation)

2 Answers   HCL,


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?

3 Answers   IBM,


I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more

2 Answers  


What are the ranges for the private ips?

0 Answers  


What command do you use to disable domain lookup? A.) no domain-lookup B.) domain no-lookup C.) lookup no-domain D.) no ip domain-lookup

2 Answers  


how to shutdown a Cisco router from command prompt?

11 Answers   Atlas Systems, HCL,


What device has content-addressable memory (CAM) and what is stored in it? 1 A: Switch, learned IP addresses 2 B: Router, learned IP addresses 3 C: Switch, learned MAC addresses 4 D: Router, learned MAC addresses

4 Answers  


Categories