Off-line Attack

March 4, 2018

You are here:
< Back

An attack where the Attacker obtains some data (typically by eavesdropping on an authentication protocol run, or by penetrating a system and stealing security files) that he/she is able to analyze in a system of his/her own choosing.
SOURCE: SP 800-63