In the field of security engineering, a pre-play attack is a cryptographic attack in which an attacker prepares for the attack in advance by carrying out a simulated transaction while pretending to be the device to be attacked, and then repeats the attack a second time with the real device at a time when it is likely to carry out the same series of operations as in the simulation. The technique relies on being able to guess the content of the transaction in advance, something usually made possible by a poor choice of unpredictability within the system.[1][2] The name is a play on "replay attack". Pre-play attacks are not very effective and chances of success are slim.

References

  1. Mike Bond; Omar Choudary; Murdoch, Steven J.; Sergei Skorobogatov; Ross Anderson (2012). "Chip and Skim: Cloning EMV cards with the pre-play attack". arXiv:1209.2531 [cs.CY].
  2. Mike Bond (September 10, 2012). "Chip and Skim: cloning EMV cards with the pre-play attack". Cambridge Computer Laboratory Security Research Group. Retrieved 2012-10-01.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.