Misplaced Pages

Pre-play attack

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

In the field of security engineering, a pre-play attack is a cryptographic attack in which an attacker prepares for the attack in advance by carrying out a simulated transaction while pretending to be the device to be attacked, and then repeats the attack a second time with the real device at a time when it is likely to carry out the same series of operations as in the simulation. The technique relies on being able to guess the content of the transaction in advance, something usually made possible by a poor choice of unpredictability within the system. The name is a play on "replay attack". Pre-play attacks are not very effective and chances of success are slim.

References

  1. Mike Bond; Omar Choudary; Murdoch, Steven J.; Sergei Skorobogatov; Ross Anderson (2012). "Chip and Skim: Cloning EMV cards with the pre-play attack". arXiv:1209.2531 .
  2. Mike Bond (September 10, 2012). "Chip and Skim: cloning EMV cards with the pre-play attack". Cambridge Computer Laboratory Security Research Group. Retrieved 2012-10-01.


Stub icon

This cryptography-related article is a stub. You can help Misplaced Pages by expanding it.

Categories:
Pre-play attack Add topic