Name of Attacks


Heading Eavesdropping

The attacker listens to information sent via the protocol.


The attacker changes the information sent via the protocol


The attacker records information sent in the protocol and forwards it to the same or a different party during protocol runs.


The attacker involves in the run of a protocol earlier to a run by the legitimate parties.


The attacker sends protocol messages back to the party who sent them.

Denial of Service

The attacker prevents legitimate parties from finalizing the protocol.


The attacker gets some useful control from the protocol to help in cryptanalysis.

Certificate Manipulation

The attacker picks or alters certificate information to attack one or more protocol runs.

Protocol Interaction

The attacker selects a new protocol to interact with a well-known protocol.