Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless.

For example, when designing an Encrypted instant messaging network, a network engineer without the capacity to crack Encryption codes could see when messages are transmitted, even if he could not read them.

Information Leakage typically leads to the ability to Predict some outcome to a relative high degree and create some an Exploit or the Protocol.

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-1) was last changed on 15-Mar-2015 15:31 by jim