Skip to main content
  • 113 Accesses

An eavesdropper (see also Shannon's model) is a person or party who tries to get unauthorized access to data, e.g. by breaking into a computer system or tapping into a communication channel. The use of a proper cryptosystem should make it impossible for the eavesdropper to determine the meaning of an intercepted message. Meaningful plaintext has been replaced by unintelligible\break ciphertext.

A common distinction is between passive eavesdroppers, who only read or listen to the ciphertext, and active eavesdroppers who may replace a ciphertext by another one, retransmit a ciphertext at a different moment, insert their own texts, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Quisquater, JJ. (2005). Eavesdropper. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_118

Download citation

Publish with us

Policies and ethics