Dolby Pro Logic

From formulasearchengine
Revision as of 08:45, 16 November 2013 by en>Locke Cole (layout)
Jump to navigation Jump to search

The Wide-Mouth Frog protocol[1] is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading. This can be proven using BAN logic.

The protocol was first described under the name "The Wide-mouthed-frog Protocol" in the paper "A Logic of Authentication" (1990), which introduced Burrows–Abadi–Needham logic, and in which it was an "unpublished protocol ... proposed by" coauthor Michael Burrows.[2] The paper gives no rationale for the protocol's whimsical name.

The protocol can be specified as follows in security protocol notation:[1][2][3]

  • A, B, and S are identities of Alice, Bob, and the trusted server respectively
  • TA and Ts are timestamps generated by A and S respectively
  • KAS is a symmetric key known only to A and S
  • KAB is a generated symmetric key, which will be the session key of the session between A and B
  • KBS is a symmetric key known only to B and S
AS:A,{TA,B,KAB}KAS
SB:{TS,A,KAB}KBS

Note that to prevent active attacks, some form of authenticated encryption (or message authentication) must be used.

The protocol has several problems:

  • a global clock is required.
  • the server S has access to all keys.
  • the value of the session key KAB is completely determined by A, who must be competent enough to generate good keys.
  • can replay messages within period when timestamp is valid.
  • A is not assured that B exists.
  • The protocol is stateful. This is usually undesired because it requires more functionality and capability from the server. For example, S must be able to deal with situations in which B is unavailable.

See also

References

43 year old Petroleum Engineer Harry from Deep River, usually spends time with hobbies and interests like renting movies, property developers in singapore new condominium and vehicle racing. Constantly enjoys going to destinations like Camino Real de Tierra Adentro.

  1. 1.0 1.1 20 year-old Real Estate Agent Rusty from Saint-Paul, has hobbies and interests which includes monopoly, property developers in singapore and poker. Will soon undertake a contiki trip that may include going to the Lower Valley of the Omo.

    My blog: http://www.primaboinca.com/view_profile.php?userid=5889534
  2. 2.0 2.1 Burrows, Abadi, and Needham. "A Logic of Authentication". ACM Transactions on Computer Systems 8 (1990), pp. 18–36.
  3. Wide Mouthed Frog, Security Protocols Open Repository