Verifier Impersonation Attack

March 5, 2018

How Can We Help?

Verifier Impersonation Attack

You are here:
< Back

A scenario where the Attacker impersonates the Verifier in an authentication protocol, usually to capture information that can be used to masquerade as a Claimant to the real Verifier.
SOURCE: SP 800-63