Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to DoS threat.
Appears in 4 contracts
Samples: Key Agreement, Key Agreement, Key Agreement
Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3V3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to a DoS threat.
Appears in 4 contracts
Samples: Key Agreement, Key Agreement, Key Agreement