Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Example attack  





2 References  





3 External links  














Relay attack






Français
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Relay station attack. Two relay stations connect over a long distance the owners transponder with the cars transceiver.

Arelay attack (also known as the two-thief attack)[1]incomputer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle attack, an attacker intercepts and manipulates communications between two parties initiated by one of the parties. In a classic relay attack, communication with both parties is initiated by the attacker who then merely relays messages between the two parties without manipulating them or even necessarily reading them.

Example attack[edit]

Peggy works in a high-security building that she accesses using a smart card in her purse. When she approaches the door of the building, the building detects the presence of a smart card and initiates an exchange of messages that constitute a zero-knowledge password proof that the card is Peggy's. The building then allows Peggy to enter.

Mallory wants to break into the building.

  1. Mallory approaches the building with a device that simulates a smart card, and the building responds by initiating the exchange of messages.
  2. Mallory forwards the message to her accomplice Evelyn who is tailing Peggy as she runs errands in another part of town.
  3. Evelyn relays the message to Peggy's smart card, listens for the answer, and forwards the answer to Mallory, who relays it to the building. Continuing in this way, Mallory and Evelyn relay messages between the building and Peggy's smart card until the building is satisfied that it is communicating with Peggy's smart card.
  4. The building opens and Mallory enters.

References[edit]

  1. ^ Jeong, Hyera; So, Jaewoo (2018-03-01). "Channel correlation‐based relay attack avoidance in vehicle keyless‐entry systems". Electronics Letters. 54 (6): 395–397. doi:10.1049/el.2017.4360. ISSN 0013-5194. S2CID 115601361.

External links[edit]


Retrieved from "https://en.wikipedia.org/w/index.php?title=Relay_attack&oldid=1204683375"

Categories: 
Hacking (computer security)
Computer security exploits
Hidden categories: 
Articles with short description
Short description matches Wikidata
 



This page was last edited on 7 February 2024, at 18:29 (UTC).

Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



Privacy policy

About Wikipedia

Disclaimers

Contact Wikipedia

Code of Conduct

Developers

Statistics

Cookie statement

Mobile view



Wikimedia Foundation
Powered by MediaWiki