man-in-the-middle attack

(redirected from Mitm)
Also found in: Acronyms.

man-in-the-middle attack

An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. A man-in-the-middle attack can be used to intercept an encrypted message exchange and spoof the recipient into thinking the message is intact from a legitimate sender. In such a case, the attackers replace the public key from the original sender with their own public key in order to decrypt the message that will be sent back from the unsuspecting recipient. See replay attack, public key cryptography and ARP cache poisoning.
References in periodicals archive ?
- MITM / Reply Attack: KSI defends MITM attack by issuing a hash tree-based certificate generated with a pair value based on user's public key and ID of devices.
Moreover, to avoid the MITM attack in directly sending public key to another device, the device owners need to assert the integrity of the public key.
It employed a Short Authentication String (SAS), which was a cryptographic hash of two DH values, for users to compare with each other's key and, hence, detect any Man-in-the-Middle (MITM) attack.
Hence, the MITM (Man-in-the-Middle) attack is out of concern.
Security condition Diffie-Hellman Scheme KAM Xie [14] Prevent replay attacking [check] [check] [check] Forward security [check] [check] [check] Integrity attacking [check] [check] [check] Known key security [check] [check] [check] Prevent wiretap attacking [check] [check] [check] Prevent MITM attacking -- [check] [check] Three-way handshake -- -- [check] TABLE 3: Delay of different transmission schemes.
Rather than using TLS (HTTPS) to encrypt the data, Plantronics took an extra step to make sure that the message couldn't be easily unencrypted using TLS DPI or Man in the Middle (MITM) techniques.
Vulnerabilities in its servers mean that it's possible to intercept that unencrypted traffic, re-route the encrypted data connections, and use a man-in-the-middle (MITM) attack to break into the encryption.
A hacker was logged into his actual account sending and responding to e-mails in a fairly convincing and targeted Man in the Middle (MitM) attack.
Da stenga drei Hiittn --tief im Schnee-- zwoa san ganz nachti, do aus der kloanern mitm Stall kummt a Liecht, des zwengt si durch alle Spaltn und Ritzn.
Man-in-the-Middle (MitM)--The attacker intercepts, alters, and relays communications between two systems/ endpoints/parties who believe they are directly communicating with each other.