What is the name of following attack?
Clash Royale CLAN TAG#URR8PPP
up vote
2
down vote
favorite
If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?
encryption cryptanalysis provable-security attack
add a comment |Â
up vote
2
down vote
favorite
If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?
encryption cryptanalysis provable-security attack
add a comment |Â
up vote
2
down vote
favorite
up vote
2
down vote
favorite
If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?
encryption cryptanalysis provable-security attack
If the whole system depends on on security of one private key and if this key for any reason compromised, the whole system will be compromised . any one can give a suitable name to such attack ?
encryption cryptanalysis provable-security attack
encryption cryptanalysis provable-security attack
asked 3 hours ago
Mohamed
162
162
add a comment |Â
add a comment |Â
2 Answers
2
active
oldest
votes
up vote
2
down vote
The whole system depends on on security of one private key (..that gets..) compromised.
Give a suitable name
I would call this class of attacks: Master key compromise.
add a comment |Â
up vote
0
down vote
It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
Take a look at this question.
Definitions of secrecy
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
add a comment |Â
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
The whole system depends on on security of one private key (..that gets..) compromised.
Give a suitable name
I would call this class of attacks: Master key compromise.
add a comment |Â
up vote
2
down vote
The whole system depends on on security of one private key (..that gets..) compromised.
Give a suitable name
I would call this class of attacks: Master key compromise.
add a comment |Â
up vote
2
down vote
up vote
2
down vote
The whole system depends on on security of one private key (..that gets..) compromised.
Give a suitable name
I would call this class of attacks: Master key compromise.
The whole system depends on on security of one private key (..that gets..) compromised.
Give a suitable name
I would call this class of attacks: Master key compromise.
answered 2 hours ago


fgrieu
74.4k6153315
74.4k6153315
add a comment |Â
add a comment |Â
up vote
0
down vote
It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
Take a look at this question.
Definitions of secrecy
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
add a comment |Â
up vote
0
down vote
It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
Take a look at this question.
Definitions of secrecy
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
add a comment |Â
up vote
0
down vote
up vote
0
down vote
It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
Take a look at this question.
Definitions of secrecy
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
It is not an attack model while it is a security feature for a scheme. The adversary might be able to compromise these lack of secrecy by different attacks to obtain the master key and find other session keys.
Take a look at this question.
Definitions of secrecy
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
answered 2 hours ago
Mehdi Sedaghat
316
316
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Mehdi Sedaghat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
add a comment |Â
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Could you please mention any kind of attacks that can compromise the master key ??
– Mohamed
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
Shoulder surfing.
– Thomas M. DuBuisson
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
There are different ways to obtain that in a specific agreement key protocol. One of the most famous is the Man-in-The-Middle attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other to know the first (master) key between them. Also, side-channel attack is another one if the attacker has access to the crypto system is able to try for obtaining the master key, reply attack and so on. You should evaluate one of them is applicable by considering different features for each security system.
– Mehdi Sedaghat
2 hours ago
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f63301%2fwhat-is-the-name-of-following-attack%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password