What is the name of following attack?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
2
down vote

favorite












If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?










share|improve this question

























    up vote
    2
    down vote

    favorite












    If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?










    share|improve this question























      up vote
      2
      down vote

      favorite









      up vote
      2
      down vote

      favorite











      If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?










      share|improve this question













      If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?







      encryption cryptanalysis provable-security attack






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked 3 hours ago









      Mohamed

      162




      162




















          2 Answers
          2






          active

          oldest

          votes

















          up vote
          2
          down vote














          The whole system depends on on security of one private key (..that gets..) compromised.

          Give a suitable name




          I would call this class of attacks: Master key compromise.






          share|improve this answer



























            up vote
            0
            down vote













            It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
            Take a look at this question.
            Definitions of secrecy






            share|improve this answer








            New contributor




            Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.

















            • Could you please mention any kind of attacks that can compromise the master key ??
              – Mohamed
              2 hours ago










            • Shoulder surfing.
              – Thomas M. DuBuisson
              2 hours ago










            • There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
              – Mehdi Sedaghat
              2 hours ago











            Your Answer




            StackExchange.ifUsing("editor", function ()
            return StackExchange.using("mathjaxEditing", function ()
            StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
            StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
            );
            );
            , "mathjax-editing");

            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "281"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f63301%2fwhat-is-the-name-of-following-attack%23new-answer', 'question_page');

            );

            Post as a guest






























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            2
            down vote














            The whole system depends on on security of one private key (..that gets..) compromised.

            Give a suitable name




            I would call this class of attacks: Master key compromise.






            share|improve this answer
























              up vote
              2
              down vote














              The whole system depends on on security of one private key (..that gets..) compromised.

              Give a suitable name




              I would call this class of attacks: Master key compromise.






              share|improve this answer






















                up vote
                2
                down vote










                up vote
                2
                down vote










                The whole system depends on on security of one private key (..that gets..) compromised.

                Give a suitable name




                I would call this class of attacks: Master key compromise.






                share|improve this answer













                The whole system depends on on security of one private key (..that gets..) compromised.

                Give a suitable name




                I would call this class of attacks: Master key compromise.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 2 hours ago









                fgrieu

                74.4k6153315




                74.4k6153315




















                    up vote
                    0
                    down vote













                    It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
                    Take a look at this question.
                    Definitions of secrecy






                    share|improve this answer








                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.

















                    • Could you please mention any kind of attacks that can compromise the master key ??
                      – Mohamed
                      2 hours ago










                    • Shoulder surfing.
                      – Thomas M. DuBuisson
                      2 hours ago










                    • There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                      – Mehdi Sedaghat
                      2 hours ago















                    up vote
                    0
                    down vote













                    It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
                    Take a look at this question.
                    Definitions of secrecy






                    share|improve this answer








                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.

















                    • Could you please mention any kind of attacks that can compromise the master key ??
                      – Mohamed
                      2 hours ago










                    • Shoulder surfing.
                      – Thomas M. DuBuisson
                      2 hours ago










                    • There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                      – Mehdi Sedaghat
                      2 hours ago













                    up vote
                    0
                    down vote










                    up vote
                    0
                    down vote









                    It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
                    Take a look at this question.
                    Definitions of secrecy






                    share|improve this answer








                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.









                    It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
                    Take a look at this question.
                    Definitions of secrecy







                    share|improve this answer








                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.









                    share|improve this answer



                    share|improve this answer






                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.









                    answered 2 hours ago









                    Mehdi Sedaghat

                    316




                    316




                    New contributor




                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.





                    New contributor





                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.






                    Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                    Check out our Code of Conduct.











                    • Could you please mention any kind of attacks that can compromise the master key ??
                      – Mohamed
                      2 hours ago










                    • Shoulder surfing.
                      – Thomas M. DuBuisson
                      2 hours ago










                    • There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                      – Mehdi Sedaghat
                      2 hours ago

















                    • Could you please mention any kind of attacks that can compromise the master key ??
                      – Mohamed
                      2 hours ago










                    • Shoulder surfing.
                      – Thomas M. DuBuisson
                      2 hours ago










                    • There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                      – Mehdi Sedaghat
                      2 hours ago
















                    Could you please mention any kind of attacks that can compromise the master key ??
                    – Mohamed
                    2 hours ago




                    Could you please mention any kind of attacks that can compromise the master key ??
                    – Mohamed
                    2 hours ago












                    Shoulder surfing.
                    – Thomas M. DuBuisson
                    2 hours ago




                    Shoulder surfing.
                    – Thomas M. DuBuisson
                    2 hours ago












                    There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                    – Mehdi Sedaghat
                    2 hours ago





                    There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
                    – Mehdi Sedaghat
                    2 hours ago


















                     

                    draft saved


                    draft discarded















































                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f63301%2fwhat-is-the-name-of-following-attack%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Comments

                    Popular posts from this blog

                    What does second last employer means? [closed]

                    List of Gilmore Girls characters

                    Confectionery