• Eavesdropping(窃听)
An Eavesdropping attack only paively observe meages.
• Modification(篡改)
A Modification attack alters or replaces some meages.
• Replay / Preplay (重放)
The attacker sends a meage that it has observed as part of the protocol run.
• Man-in-the-Middle(中间人)
In a Man-in-the-Middle attack the attacker gets in the middle of a real run of a protocol.• Reflection(反射)
Reflection attacks are a kind of replay attack that use a protocol against itself.
• Denial of Service(拒绝服务)
A DoS attack tries to use up all of a severs CPU or memory by making 1,000,000s of requests.
• Typing Attack(类型攻击)
In a typing attack the attacker paes off one type of meage as being another.
• Cryptanalysis(密码分析)
• Cryptanalysis is the study of methods for obtaining the meaning of encrypted
information, without acce to the secret information which is normally required to do so.
• certificate manipulation (证书操纵)
modification of the certificate
• protocol interaction (协议交互)
using a new protocol to interact with a known protocol
Zero-knowledge proof (零知识证明)
• A zero-knowledge proof is a way that a “prover” can prove poeion of a certain piece
of information to a “verifier” without revealing it.
• Selective Disclosure(选择性泄露)
(密钥传输)A key transport protocol or mechanism is a key establishment technique where one party creates or obtains a secret key, and then securely transfers it to the other(s)
(密钥协商)A key agreement protocol or mechanism is a key establishment technique in which a shared secret key is derived by two (or more) parties as a function of information contributed by, or aociated with, each of these, (ideally) such that no party can predetermine the resulting value.
******************************概念比较*************************************** 重放与反射
比特承诺与抛币:类似于比特承诺,但承诺是随机的。
群签与环签:P146
Kerboros认证P61
批签名
• (比特承诺)In cryptography, a commitment scheme allows one to commit to a value
while keeping it hidden, with the ability to reveal the committed value later.