Wide Mouth Frog protocol

Wide Mouth Frog protocol

The Wide Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading.

The protocol can be specified as follows in security protocol notation, where Alice is authenticating herself to Bob using a server S:

A ightarrow S: A,{T_A, K_{AB}, B}_{K_{AS

S ightarrow B: {T_S, K_{AB}, A}_{K_{BS

Note that to prevent active attacks, some form of authenticated encryption (or message authentication) must be used.

The protocol has several problems
* a global clock is required
* the server has access to all keys
* the value of the shared key between "A" and "B" is completely determined by "A".

ee also

*Kerberos
*Otway-Rees
*Needham-Schroeder


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Wide-Mouth Frog — Криптографические обозначения, используемые в протоколах проверки подлинности и обмена ключами Идентифкаторы Алисы (Alice), инициатора сессии Идентифкатор Боба (Bob), стороны, с которой устанавливается сессия Идентифкатор Трента (Trent),… …   Википедия

  • Needham–Schroeder protocol — The term Needham–Schroeder protocol can refer to one of two communication protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.[1] These are: The Needham–Schroeder Symmetric Key Protocol is… …   Wikipedia

  • Needham-Schroeder protocol — The term Needham Schroeder protocol can refer to one of two communication protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.Citation | last1=Needham | first1=Roger | last2=Schroeder | first2 …   Wikipedia

  • Neuman–Stubblebine protocol — The Neuman–Stubblebine protocol is a computer network authentication protocol designed for use on insecure networks (e.g., the Internet). It allows individuals communicating over such a network to prove their identity to each other. This protocol …   Wikipedia

  • Otway–Rees protocol — The Otway–Rees protocol is a computer network authentication protocol designed for use on insecure networks (eg. the Internet). It allows individuals communicating over such a network to prove their identity to each other while also preventing… …   Wikipedia

  • Otway-Rees protocol — The Otway Rees protocol is a computer network authentication protocol designed for use on insecure networks (eg. the Internet). It allows individuals communicating over such a network to prove their identity to each other while also preventing… …   Wikipedia

  • Burrows-Abadi-Needham logic — (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols. Specifically, BAN logic helps its users determine whether exchanged information is trustworthy, secured against eavesdropping, or both. BAN …   Wikipedia

  • Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

  • Kerberos — /kɛərbərəs/  сетевой протокол аутентификации, позволяющий передавать данные через незащищённые сети для безопасной идентификации. Ориентирован , в первую очередь , на клиент серверную модель и обеспечивает взаимную аутентификацию  оба… …   Википедия

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”