2. Attacks
One might think that the main attacks on cryptographic protocols are based on decrypting encrypted messages. In fact, many attacks are based on principles that are much simpler to implement, such as intercepting one message and sending another back.
2.1 Man-in-the-middle attack
For example, G. Lowe
Agent...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Attacks
Article included in this offer
"Mathematics"
(
165 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!