replay attack (Q1756025)

From Wikidata
Jump to navigation Jump to search
network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed, carried out either by the originator or by an adversary who intercepts the data and retransmits it
  • playback attack
  • CWE-294: Authentication Bypass by Capture-replay
  • capture-replay attack
edit
Language Label Description Also known as
English
replay attack
network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed, carried out either by the originator or by an adversary who intercepts the data and retransmits it
  • playback attack
  • CWE-294: Authentication Bypass by Capture-replay
  • capture-replay attack

Statements

0 references
1 reference
p.1 / Index Terms / replay attacks, [...], run identifiers, component numbers. / I. INTRODUCTION / p.3 / In the same spirit, we prove that all replay attacks can be pre- vented by tagging each encrypted component with a session- id (another name for Carlsen’s protocol run identifier) and a component number (renaming Carlsen’s message subcompo- nent identifier). (English)

Identifiers

 
edit
    edit
      edit
        edit
          edit
            edit
              edit
                edit