Skip to end of banner
Go to start of banner

Passive Impersonation Attack (Dictionary Entry)

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Next »

Contexts

Cryptography, IAM, Information Security

Term

Passive Impersonation Attack

Alternative Forms

Definitions

Related Terms

  • Impersonation Attack

Quotes

Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.

(Calmet, 2008, p. 5)

Bibliography

  • Calmet, 2008

See Also

  • No labels