Common use of Late detection of MITM Clause in Contracts

Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to DoS threat.

Appears in 4 contracts

Samples: pdfs.semanticscholar.org, res.mdpi.com, research-repository.griffith.edu.au

AutoNDA by SimpleDocs

Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3V3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to a DoS threat.

Appears in 4 contracts

Samples: pdfs.semanticscholar.org, res.mdpi.com, research-repository.griffith.edu.au

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.