Dolby Pro Logic: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Locke Cole
layout
en>Comp.arch
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
The '''Wide-Mouth Frog protocol'''<ref name="AC">{{cite book|last=Schneier|first=Bruce|title=Applied Cryptography, 2e|publisher=Wiley|year=1996|isbn=978-0-471-11709-4|pages=56 et seq}}</ref> is a [[computer network]] [[authentication]] [[cryptographic protocol|protocol]] designed for use on insecure networks (the [[Internet]] for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading. This can be [[BAN logic analysis of the Wide Mouth Frog protocol|proven using BAN logic]].


The protocol was first described under the name "The Wide-mouthed-frog Protocol" in the paper "A Logic of Authentication" (1990), which introduced [[Burrows–Abadi–Needham logic]], and in which it was an "unpublished protocol ... proposed by" coauthor [[Michael Burrows]].<ref name="BAN">[[Michael Burrows|Burrows]], [[Martín Abadi|Abadi]], and [[Roger Needham|Needham]]. [http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.3569 "A Logic of Authentication"]. ''ACM Transactions on Computer Systems'' 8 (1990), pp. 18&ndash;36.</ref> The paper gives no rationale for the protocol's whimsical name.


The protocol can be specified as follows in [[security protocol notation]]:<ref name="AC"/><ref name="BAN"/><ref name="spore">[http://www.lsv.ens-cachan.fr/Software/spore/wideMouthedFrog.html Wide Mouthed Frog], ''Security Protocols Open Repository''</ref>
[http://www.thefreedictionary.com/Eusebio Eusebio] is the name women and men use to call for me and I think it sounds quite good when you say it. Idaho is our birth install. I included to be unemployed except now I am a major cashier. My friends say it's not superb for me but something I love doing is definitely to bake but I am glad for [http://en.wiktionary.org/wiki/thinking thinking] on starting new things. I'm not good at web design but you might feel the need to check my website: http://prometeu.net<br><br>My web-site :: [http://prometeu.net clash of clans hack tool free download]
* A, B, and S are identities of Alice, Bob, and the trusted server respectively
* <math>T_A</math> and <math>T_s</math> are [[timestamp]]s generated by A and S respectively
* <math>K_{AS}</math> is a [[symmetric key]] known only to A and S
* <math>K_{AB}</math> is a generated symmetric key, which will be the [[session key]] of the session between A and B
* <math>K_{BS}</math> is a symmetric key known only to B and S
 
: <math>A \rightarrow S: A,\{T_A, B, K_{AB}\}_{K_{AS}}</math>
 
: <math>S \rightarrow B: \{T_S, A, K_{AB}\}_{K_{BS}}</math>
 
Note that to prevent active attacks, some form of authenticated encryption (or message authentication) must be used.
 
The protocol has several problems:
* a global clock is required.
* the server S has access to all keys.
* the value of the session key <math>K_{AB}</math> is completely determined by ''A'', who must be competent enough to generate good keys.
* can replay messages within period when timestamp is valid.
* ''A'' is not assured that ''B'' exists.
* The protocol is stateful. This is usually undesired because it requires more functionality and capability from the server. For example, ''S'' must be able to deal with situations in which ''B'' is unavailable.
 
==See also==
*[[Alice and Bob]]
*[[Kerberos (protocol)]]
*[[Needham-Schroeder]]
*[[Neuman–Stubblebine protocol]]
*[[Otway-Rees]]
*[[Yahalom (protocol)]]
 
==References==
{{Reflist}}
 
[[Category:Computer access control protocols]]

Latest revision as of 19:13, 6 October 2014


Eusebio is the name women and men use to call for me and I think it sounds quite good when you say it. Idaho is our birth install. I included to be unemployed except now I am a major cashier. My friends say it's not superb for me but something I love doing is definitely to bake but I am glad for thinking on starting new things. I'm not good at web design but you might feel the need to check my website: http://prometeu.net

My web-site :: clash of clans hack tool free download