Active attack: Difference between revisions
imported>Sandy Harris (new page, basic info, some links) |
imported>Sandy Harris (typo) |
||
Line 10: | Line 10: | ||
Successful active attacks are devastating; if the attacker can replace messages and have them taken as genuine, it is all over. The security system is then at best worthless; at worst it is of great value to the enemy. Fortunately, active attacks are often hard to execute. | Successful active attacks are devastating; if the attacker can replace messages and have them taken as genuine, it is all over. The security system is then at best worthless; at worst it is of great value to the enemy. Fortunately, active attacks are often hard to execute. | ||
Moreover, [[cryptographic authentication]] provides a complete defense against active attackers. [[Public key]] techniques are often used to authenticate people or devices, to ensure communication is with the right party and prevent [[man-in-the-middle attack]]s. Packets or messages are often authenticated with a [[hashed message authentication]] | Moreover, [[cryptographic authentication]] provides a complete defense against active attackers. [[Public key]] techniques are often used to authenticate people or devices, to ensure communication is with the right party and prevent [[man-in-the-middle attack]]s. Packets or messages are often authenticated with a [[hashed message authentication code]]; this prevents [[Stream_cipher#Rewrite_attacks | rewrite attacks]], among others. |
Revision as of 04:33, 1 November 2008
In cryptography an active attack on a communications system is one in which the attacker changes the communication. He may forge, alter, replace, block or reroute messages. This contrasts with a passive attack in which the attacker only eavesdrops; he may read messages he is not supposed to see, but he does not alter messages.
Active attack include:
- man-in-the-middle attack; the attacker tricks both communicating parties into communicating with him; they think they are talking to each other
- rewrite attacks; the attacker can replace a message with anything he chooses
Successful active attacks are devastating; if the attacker can replace messages and have them taken as genuine, it is all over. The security system is then at best worthless; at worst it is of great value to the enemy. Fortunately, active attacks are often hard to execute.
Moreover, cryptographic authentication provides a complete defense against active attackers. Public key techniques are often used to authenticate people or devices, to ensure communication is with the right party and prevent man-in-the-middle attacks. Packets or messages are often authenticated with a hashed message authentication code; this prevents rewrite attacks, among others.