Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties

Contexts

Cryptography, IAM, Information Security

Term

Passive Impersonation Attack

Alternative Forms

Definitions

Related Terms

Quotes

Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.

(CalmetCrescenzo, 2008, p. 5)

Bibliography

See Also

Filter by label (Content by label)
showLabelsfalse
sorttitle
cqllabel = "passive-impersonation-attack"