Concurrent Impersonation Attack (Dictionary Entry)

Contexts

Cryptography, IAM, Information Security

Term

Concurrent Impersonation Attack

Alternative Forms

 

Definitions

 

Related Terms

Quotes

Concurrent Impersonation Attack: this attack further extends the active attack in that the adversary can choose to engage, acting as a server, in concurrent executions of the identification scheme with a different instantiation of P (using the same public and private keys), until it decides to make an impersonation attempt; thus, at any given time, the adversary can decide to start a new session with a new instantiation of P, to continue a previous session by sending the next verifier’s message, or to start the impersonation attempt.

Bibliography

See Also


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.