/
Passive Impersonation Attack (Dictionary Entry)

Passive Impersonation Attack (Dictionary Entry)

Contexts

Cryptography, IAM, Information Security

Term

Passive Impersonation Attack

Alternative Forms

 

Definitions

 

Related Terms

Quotes

Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.

Bibliography

See Also

Related content

Concurrent Impersonation Attack (Dictionary Entry)
Concurrent Impersonation Attack (Dictionary Entry)
More like this
Impersonation (Dictionary Entry)
Impersonation (Dictionary Entry)
More like this
Exploited Identity (Dictionary Entry)
Exploited Identity (Dictionary Entry)
More like this
Crescenzo, 2008
Crescenzo, 2008
More like this
Authentication (Dictionary Entry)
Authentication (Dictionary Entry)
More like this
Compromised Identity (Dictionary Entry)
Compromised Identity (Dictionary Entry)
More like this

Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.