翻訳と辞書
Words near each other
・ Wide Eyed (Nichole Nordeman album)
・ Wide Eyed (The Junior Varsity album)
・ Wide Field and Planetary Camera
・ Wide Field and Planetary Camera 2
・ Wide Field Camera
・ Wide Field Camera 3
・ Wide Field Infrared Explorer
・ Wide Field Infrared Survey Telescope
・ Wide game
・ Wide Hive Records
・ Wide is My Motherland
・ Wide is the Gate
・ Wide leg jeans
・ Wide load
・ Wide local excision
Wide Mouth Frog protocol
・ Wide Mouth Mason
・ Wide Mouth Mason (album)
・ Wide Mouth Mason discography
・ Wide Open
・ Wide Open (film)
・ Wide Open (Jason Aldean album)
・ Wide Open (Millennium)
・ Wide Open (Sawyer Brown album)
・ Wide Open Faces
・ Wide Open Live & More
・ Wide Open Road (song)
・ Wide Open Space (song)
・ Wide Open Spaces
・ Wide Open Spaces (1924 film)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Wide Mouth Frog protocol : ウィキペディア英語版
Wide Mouth Frog protocol
The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allows individuals communicating over a network to prove their identity to each other while also preventing eavesdropping or replay attacks, and provides for detection of modification and the prevention of unauthorized reading. This can be proven using BAN logic.
The protocol was first described under the name "The Wide-mouthed-frog Protocol" in the paper "A Logic of Authentication" (1990), which introduced Burrows–Abadi–Needham logic, and in which it was an "unpublished protocol ... proposed by" coauthor Michael Burrows.〔Burrows, Abadi, and Needham. ("A Logic of Authentication" ). ''ACM Transactions on Computer Systems'' 8 (1990), pp. 18–36.〕 The paper gives no rationale for the protocol's whimsical name.
The protocol can be specified as follows in security protocol notation:〔〔〔(Wide Mouthed Frog ), ''Security Protocols Open Repository''〕
* A, B, and S are identities of Alice, Bob, and the trusted server respectively
* T_A and T_s are timestamps generated by A and S respectively
* K_ is a symmetric key known only to A and S
* K_ is a generated symmetric key, which will be the session key of the session between A and B
* K_ is a symmetric key known only to B and S
: A \rightarrow S: A,\_\}_ is completely determined by ''A'', who must be competent enough to generate good keys.
* It can replay messages within the period when the timestamp is valid.
* ''A'' is not assured that ''B'' exists.
* The protocol is stateful. This is usually undesired because it requires more functionality and capability from the server. For example, ''S'' must be able to deal with situations in which ''B'' is unavailable.
==See also==

*Alice and Bob
*Kerberos (protocol)
*Needham-Schroeder
*Neuman–Stubblebine protocol
*Otway-Rees
*Yahalom (protocol)

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Wide Mouth Frog protocol」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.