CZ:Featured article/Current: Difference between revisions
imported>Chunbum Park (→Accidental release source terms: Acid rain) |
imported>Chunbum Park (→Acid rain: Active attack) |
||
Line 1: | Line 1: | ||
== '''[[ | == '''[[Active attack]]''' == | ||
---- | ---- | ||
In [[cryptography]] an '''active attack''' on a communications system is one in which the attacker changes the communication. He may create, forge, alter, replace, block or reroute messages. This contrasts with a [[passive attack]] in which the attacker only eavesdrops; he may read messages he is not supposed to see, but he does not alter messages. | |||
== Active attacks on communication == | |||
Active attacks that target the communication system itself include: | |||
* [[man-in-the-middle attack]]; the attacker tricks both communicating parties into communicating with him; they think they are talking to each other | |||
* [[Stream_cipher#Rewrite_attacks | rewrite attacks]]; the attacker can replace a message with anything he chooses | |||
'''Successful active attacks are devastating!''' If the attacker can replace messages and have them taken as genuine, it is all over. The security system is then at best worthless; at worst it is of great value to the enemy. | |||
''[[ | Fortunately, these attacks are '''generally hard to execute'''. The attacker must not only intercept messages, break whatever [[cryptography]] is in use (often ''both'' an authentication mechanism and a cipher), and send off his bogus message; he also has to block delivery of the genuine message. Moreover, he has to do it all '''in real time''', fast enough to avoid alerting his victims and to beat whatever synchronisation mechanisms the network may be using. A cryptosystem that an enemy can break in hours or days would generally be considered insecure, even worthless, but it will prevent active attacks as long as the enemy cannot break it quickly enough to replace messages. | ||
''[[Active attack|.... (read more)]]'' | |||
{| class="wikitable collapsible collapsed" style="width: 90%; float: center; margin: 0.5em 1em 0.8em 0px;" | {| class="wikitable collapsible collapsed" style="width: 90%; float: center; margin: 0.5em 1em 0.8em 0px;" | ||
|- | |- | ||
! style="text-align: center;" | [[ | ! style="text-align: center;" | [[Active attack|notes]] | ||
|- | |- | ||
| | | | ||
{{reflist|2}} | {{reflist|2}} | ||
|} | |} |
Revision as of 15:26, 27 July 2013
Active attack
In cryptography an active attack on a communications system is one in which the attacker changes the communication. He may create, forge, alter, replace, block or reroute messages. This contrasts with a passive attack in which the attacker only eavesdrops; he may read messages he is not supposed to see, but he does not alter messages.
Active attacks on communication
Active attacks that target the communication system itself include:
- man-in-the-middle attack; the attacker tricks both communicating parties into communicating with him; they think they are talking to each other
- rewrite attacks; the attacker can replace a message with anything he chooses
Successful active attacks are devastating! If the attacker can replace messages and have them taken as genuine, it is all over. The security system is then at best worthless; at worst it is of great value to the enemy.
Fortunately, these attacks are generally hard to execute. The attacker must not only intercept messages, break whatever cryptography is in use (often both an authentication mechanism and a cipher), and send off his bogus message; he also has to block delivery of the genuine message. Moreover, he has to do it all in real time, fast enough to avoid alerting his victims and to beat whatever synchronisation mechanisms the network may be using. A cryptosystem that an enemy can break in hours or days would generally be considered insecure, even worthless, but it will prevent active attacks as long as the enemy cannot break it quickly enough to replace messages.
notes |
---|