Encyclopedia of Cryptography and Security

2011 Edition
| Editors: Henk C. A. van Tilborg, Sushil Jajodia

Eavesdropping

  • Micah Sherr
Reference work entry
DOI: https://doi.org/10.1007/978-1-4419-5906-5_109

Synonyms

Related Concepts

Definition

Eavesdropping is the surreptitious monitoring of communication.

Background

Eavesdropping has two underlying goals. Primarily, it seeks to monitor communication with high information fidelity. The intercepted communication should closely reflect the information that the sender is attempting to convey to the receiver. Additionally, eavesdropping should be a clandestine operation; neither the sender nor the receiver should be aware of the eavesdropper’s presence.

Eavesdropping can be classified into two techniques. In passive eavesdropping, the eavesdropper monitors communication and does not interfere with the communication channel. Passive eavesdroppers are difficult to detect since their presence does not produce any observable effects. In contrast, active eavesdroppingtechniques permit the eavesdropper to both observe the communication medium as well as modify its contents. In...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Bellovin SM (2000) Wiretapping the net. The Bridge 20(2):21–26Google Scholar
  2. 2.
    Blaze M, Bellovin SM (2000) Inside RISKS: Tapping on my network door. Commun ACM 43(10):136CrossRefGoogle Scholar
  3. 3.
    Reed MG, Syverson PF, Goldschlag DM (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16(4):482–494CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Micah Sherr
    • 1
  1. 1.Department of Computer ScienceGeorgetown UniversityWashingtonUSA