Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties

Contexts

Cryptography, IAM, Information Security

Term

Active Impersonation Attack

Alternative Forms

Definitions

Related Terms

Quotes

Active Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to engage, acting as a server, in sequential executions of the identification scheme with P until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.

...