replay attack (Q1756025)
Jump to navigation
Jump to search
network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed, carried out either by the originator or by an adversary who intercepts the data and retransmits it
- playback attack
- CWE-294: Authentication Bypass by Capture-replay
- capture-replay attack
Language | Label | Description | Also known as |
---|---|---|---|
English | replay attack |
network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed, carried out either by the originator or by an adversary who intercepts the data and retransmits it |
|
Statements
1 reference
p.1 / Index Terms / replay attacks, [...], run identifiers, component numbers. / I. INTRODUCTION / p.3 / In the same spirit, we prove that all replay attacks can be pre- vented by tagging each encrypted component with a session- id (another name for Carlsen’s protocol run identifier) and a component number (renaming Carlsen’s message subcompo- nent identifier). (English)
Identifiers
1 reference
Sitelinks
Wikipedia(19 entries)
- cawiki Atac de replay
- cswiki Replay attack
- dewiki Replay-Angriff
- enwiki Replay attack
- eswiki Ataque de REPLAY
- fawiki حمله بازپخش
- frwiki Attaque par rejeu
- hewiki התקפת שליחה מחדש
- itwiki Replay attack
- jawiki 反射攻撃
- kowiki 재전송 공격
- lmowiki Replay attack
- ltwiki Pakartojimo ataka
- ruwiki Атака повторного воспроизведения
- trwiki Tekrarlama saldırısı
- ukwiki Атака повторного відтворення
- viwiki Tấn công phát lại
- zh_yuewiki 重送攻擊
- zhwiki 重放攻击