Common use of Adversary Clause in Contracts

Adversary. The adversary is a very powerful agent with powerful computing resources. It is able to move about freely in the deployment space to monitor transmissions, replay messages and insert its own fabricated messages. It is also able to physically capture nodes and extract all the keying material, including the public key IDs, the private key sets S and the keying parameters from ROM and RAM memory.

Appears in 2 contracts

Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme