Answer Posted / gtech
The Wide Mouth Frog protocol is a computer network
authentication protocol designed for use on insecure
networks (the Internet for example). It allows individuals
communicating over a network to prove their identity to each
other while also preventing eavesdropping or replay attacks,
and provides for detection of modification and the
prevention of unauthorized reading (cont)........
This can be proven using BAN logic.
The protocol can be specified as follows in security
protocol notation, where Alice is authenticating herself to
Bob using a server S:
A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS}}
S ightarrow B: {T_S, K_{AB}, A}_{K_{BS}}
Note that to prevent active attacks, some form of
authenticated encryption (or message authentication) must be
used.
The protocol has several problems:
* a global clock is required.
* the server has access to all keys.
* the value of the shared key between A and B is completely
determined by A.
* can replay messages within period when timestamp is valid.
* A is not assured that B exists.
* The protocol is stateful. This is usually undesired
because it requires more functionality and capability from
the server. For example, "S" must be able to deal with
situations in which "B" is unavailable.
------- :)---------
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Tell me which cable we connect in db-9?
What is an autonomous system?
What is ospf? Describe it.
What is syntax of ipv4?
Explain what are the ranges of private ips?
Mention what is the matric of eigrp protocol?
Does a bridge divides a network into smaller segments?
What is the difference between ‘bit rate’ and ‘baud rate’?
Which command we give on privilege mode for coming back to user execution mode?
Differnce between the communication and transmission?
Explain the term 'broadcast'.
What’s the easiest way to remotely configure a router?
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
What are the conversion steps of data encapsulation?
If bandwidth will increase what will happen?