词条 | Pre-play attack |
释义 |
In the field of security engineering, a pre-play attack is a cryptographic attack in which an attacker prepares for the attack in advance by carrying out a simulated transaction while pretending to be the device to be attacked, and then repeats the attack a second time with the real device at a time when it is likely to carry out the same series of operations as in the simulation. The technique relies on being able to guess the content of the transaction in advance, something usually made possible by a poor choice of unpredictability within the system.[1][2] The name is a play on "replay attack". Pre-play attacks are not very effective and chances of success are slim. References1. ^{{cite arXiv|eprint=1209.2531|author1=Mike Bond|author2=Omar Choudary|last3=Murdoch|first3=Steven J.|author4=Sergei Skorobogatov|author5=Ross Anderson|title=Chip and Skim: Cloning EMV cards with the pre-play attack|class=cs.CY|year=2012}} {{crypto-stub}}2. ^{{cite web|url=http://www.lightbluetouchpaper.org/2012/09/10/chip-and-skim-cloning-emv-cards-with-the-pre-play-attack/|title=Chip and Skim: cloning EMV cards with the pre-play attack|date=September 10, 2012|author=Mike Bond|publisher=Cambridge Computer Laboratory Security Research Group|accessdate=2012-10-01}} 2 : Cryptographic attacks|Computer security exploits |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。