None
An attack against an authentication protocol where the Attacker either assumes the role of a Claimant with a genuine Verifier or actively alters the authentication channel.
Source(s):
NIST SP 800-63-3
NIST SP 800-63-2
[Superseded]