Sean,
I am OK with the changes. I am not familiar with the right terms in this
field however, masquerades sound to me as only one of the possible things
that can be done by the person that gets the private key. They can also
have access to encrypted material for example. Anyway if you think
Dan,
I actually dug masquerade out of Williams Stallings' classic network
security book, but I like impersonate more.
spt
Dan Brown wrote:
Sean, Avshalom,
Maybe ”impersonate” is more specific than “masquerade”, as the latter
also connotes a party where the parties don masks.
Also,
Sean, Avshalom,
Maybe impersonate is more specific than masquerade, as the latter
also connotes a party where the parties don masks.
Also, impersonate has some precedence in cryptographic terminology.
For example, American National Standard X9.63 for example lists an
attack called Key