System Breakdown Clause Samples
System Breakdown. The scheme is considered broken if the adversary is able to, by monitoring transmissions or using the keys from captured nodes,
(1) obtain the pairwise keys of any other pairs of uncompromised nodes, or
(2) fabricate new valid public and private keys, or
(3) compute the master keys of the TA. Identity theft attacks, where the adversary clones a node by fabricating a new node with the identical keys from the captured node, though a very serious threat, is beyond the scope of this paper.
System Breakdown. If a hard disk crashes or there's a serious operating system failure, New Wave will reinstall standard OS distributions and supported preinstalled software.
