Passive attack: Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>OAbot
m Open access bot: url-access updated in citation with #oabot.
 
imported>Citation bot
Added bibcode. Removed URL that duplicated identifier. Removed parameters. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 30/967
 
Line 70: Line 70:
   }}</ref>
   }}</ref>
<ref name="nlhb">{{cite book
<ref name="nlhb">{{cite book
  | chapter-url      = https://ieeexplore.ieee.org/document/5703571
   | chapter    = On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack
   | chapter    = On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack
   | last      = Abyaneh
   | last      = Abyaneh
Line 84: Line 83:
  }}</ref>
  }}</ref>
<ref name="manets">{{cite journal
<ref name="manets">{{cite journal
  | url      = https://ieeexplore.ieee.org/document/6034725
   | title    = Secrecy Throughput of MANETs Under Passive and Active Attacks
   | title    = Secrecy Throughput of MANETs Under Passive and Active Attacks
   | last1    = Liang
   | last1    = Liang
Line 99: Line 97:
  | publisher = IEEE
  | publisher = IEEE
   | doi = 10.1109/TIT.2011.2165800
   | doi = 10.1109/TIT.2011.2165800
| bibcode = 2011ITIT...57.6692L
  | s2cid = 15255934
  | s2cid = 15255934
  | url-access= subscription
  }}</ref>
  }}</ref>
<ref name="meshnets">{{Cite journal
<ref name="meshnets">{{Cite journal
   | url    = http://bura.brunel.ac.uk/handle/2438/3663
   | url    = http://bura.brunel.ac.uk/handle/2438/3663

Latest revision as of 04:57, 27 August 2025

Template:Short description A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext).[1][2] This can also include known plaintext attacks where both the plaintext and its corresponding ciphertext are known.

While active attackers can interact with the parties by sending data, a passive attacker is limited to intercepting communications (eavesdropping), and seeks to decrypt data by interpreting the transcripts of authentication sessions.[3][4] Since passive attackers do not introduce data of their own, they can be difficult to detect.[5]

While most classical ciphers are vulnerable to this form of attack, most modern ciphers are designed to prevent this type of attack above all others.

Attributes

  • Traffic analysis
  • Non-evasive eavesdropping and monitoring of transmissions[6]
  • Because data unaffected, tricky to detect
  • Emphasis on prevention (encryption) not detection
  • Sometimes referred to as "tapping"

The main types of passive attacks are traffic analysis and release of message contents.

During a traffic analysis attack, the eavesdropper analyzes the traffic, determines the location, identifies communicating hosts and observes the frequency and length of exchanged messages. He uses all this information to predict the nature of communication. All incoming and outgoing traffic of the network is analyzed, but not altered.

For a release of message content, a telephonic conversation, an E-mail message or a transferred file may contain confidential data. A passive attack monitors the contents of the transmitted data.

Passive attacks are very difficult to detect because they do not involve any alteration of the data. When the messages are exchanged neither the sender nor the receiver is aware that a third party may capture the messages. This can be prevented by encryption of data.

A recent study on the cybersecurity of wearable devices used passive attacks on different smartwatches to test whether they have significant vulnerabilities and whether they are the best targets during the pairing process.[7]

See also

References

  1. Script error: No such module "citation/CS1".
  2. Script error: No such module "citation/CS1".
  3. Script error: No such module "citation/CS1".
  4. Script error: No such module "Citation/CS1".
  5. Script error: No such module "Citation/CS1".
  6. Script error: No such module "citation/CS1".
  7. Script error: No such module "Citation/CS1".

Further reading


Template:Asbox