Common use of Late detection of MITM Clause in Contracts

Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to DoS threat.

Appears in 4 contracts

Samples: Key Agreement, Key Agreement, Key Agreement

AutoNDA by SimpleDocs

Late detection of MITM. Lead to DoS: The same issue regarding the late detection of a MITM attack also holds in this scheme. After receiving MSG1, the SP is unable to check if this request is coming from a registered SM. Only after receiving the last message MSG3 and verifying the hash value A3V3, the SP can decide if the key negotiation has been successfully executed. As a result, this weakness could lead to a DoS threat.

Appears in 4 contracts

Samples: Key Agreement, Key Agreement, Key Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!