Passive Impersonation Attack (Dictionary Entry)
Contexts | Cryptography, IAM, Information Security |
---|---|
Term | Passive Impersonation Attack |
Alternative Forms |
|
Definitions |
|
Related Terms |
|
Quotes
Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.
(Crescenzo, 2008, p. 5)
Bibliography
See Also
-
Passive Impersonation Attack (Dictionary Entry) (Dictionary)
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.