Page Properties |
---|
Contexts | Cryptography, IAM, Information Security |
---|
Term | Passive Impersonation Attack |
---|
Alternative Forms | |
---|
Definitions | |
---|
Related Terms | |
---|
|
Quotes
Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.
(CalmetCrescenzo, 2008, p. 5)
Bibliography
See Also
Filter by label (Content by label) |
---|
showLabels | false |
---|
sort | title |
---|
cql | label = "passive-impersonation-attack" |
---|
|