0% found this document useful (0 votes)
66 views1 page

Man in Middle Attack: Bob's Key) - Bob

A man in the middle attack involves an attacker intercepting communications between two parties and inserting themselves in the middle. The attacker is able to intercept messages from Alice intended for Bob, and replies to Alice pretending to be Bob. This allows the attacker to obtain Bob's encryption key, and replace it with their own key. Any messages encrypted with the attacker's key can now be read by the attacker before forwarding on to the intended recipient. This demonstrates how public key encryption can be compromised without a way for the parties to verify they are using each other's true keys.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views1 page

Man in Middle Attack: Bob's Key) - Bob

A man in the middle attack involves an attacker intercepting communications between two parties and inserting themselves in the middle. The attacker is able to intercept messages from Alice intended for Bob, and replies to Alice pretending to be Bob. This allows the attacker to obtain Bob's encryption key, and replace it with their own key. Any messages encrypted with the attacker's key can now be read by the attacker before forwarding on to the intended recipient. This demonstrates how public key encryption can be compromised without a way for the parties to verify they are using each other's true keys.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

MAN IN MIDDLE ATTACK

1. Alice sends a message to Bob, which is intercepted by Mallory:


Alice "Hi Bob, it's Alice. Give me your key"--> Mallory

Bob

2. Mallory relays this message to Bob; Bob cannot tell it is not really from Alice:
Alice

Mallory "Hi Bob, it's Alice. Give me your key"--> Bob

3. Bob responds with his encryption key:


Alice

Mallory <--[Bob's_key] Bob

4. Mallory replaces Bob's key with her own, and relays this to Alice, claiming that
it is Bob's key:
Alice <--[Mallory's_key] Mallory

Bob

5. Alice encrypts a message with what she believes to be Bob's key, thinking that
only Bob can read it:
Alice "Meet me at the bus stop!"[encrypted with Mallory's key]--> Mallory
Bob
6. However, because it was actually encrypted with Mallory's key, Mallory can
decrypt it, read it, modify it (if desired), re-encrypt with Bob's key, and forward it
to Bob:
Alice
Mallory "Meet me in the windowless van on 22nd Ave!"[encrypted with
Bob's key]--> Bob
7. Bob thinks that this message is a secure communication from Alice.
This example shows the need for Alice and Bob to have some way to ensure that
they are truly using each other's public keys, rather than the public key of an
attacker. Otherwise, such attacks are generally possible, in principle, against any
message sent using public-key technology. Fortunately, there are a variety of
techniques that help defend against MITM attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy