Penguin
Blame: ManInTheMiddle
EditPageHistoryDiffInfoLikePages
Annotated edit history of ManInTheMiddle version 4, including all changes. View license author blame.
Rev Author # Line
1 StuartYeates 1 [ManInTheMiddle] is a classic cryptographic attack.
2
4 ShaneHowearth 3 If Alice and Bob want to communicate securely via email (or phone or whatever) then unless they have some means to authenticate themselves and each other, Cain could pretend to Alice that he's Bob and pretend to Bob that he's Alice. When Alice sends a message to Cain (whom she thinks is Bob), she encrypts it with Cains key and sends it to him, he receives it, decrypts it, reads the message, and encrypts it with Bob's key and sends it to him. Unless they have some way of communicating outside of the secure channel, Alice and Bob may never know that their email is being read.
1 StuartYeates 4
3 StuartYeates 5 The combination of authentication, DiffieHellmanKeyExchange and [Signature]s or the WebOfTrust are thought to be effective countermeasures to ManInTheMiddle attacks.
1 StuartYeates 6
7 ----
8 CategoryCryptography