Common use of System Breakdown Clause in Contracts

System Breakdown. The scheme is considered broken if the adversary is able to, by monitoring transmissions or using the keys from captured nodes, (1) obtain the pairwise keys of any other pairs of uncompromised nodes, or (2) fabricate new valid public and private keys, or (3) compute the master keys of the TA. Identity theft attacks, where the adversary clones a node by fabricating a new node with the identical keys from the captured node, though a very serious threat, is beyond the scope of this paper.

Appears in 2 contracts

Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme