Consider the ‘main-in-the-middle’ attack v1 for exchanging a session key between Alice and Bob in a public key cryptosystem. Show why applying ‘the simple fix’ cannot resist the ‘man-in-the-middle’ attack. Note ‘the simple fix’ is for Alice to use her private key to encrypt the session key first before encrypting it with Bob’s public key. It is assumed Alice’s public key is known to everybody



Answer :

Other Questions