Public-key cryptography: Difference between revisions

Content deleted Content added
MofeO (talk | contribs)
Added citation
Undid revision 1280246080 by MofeO (talk). This source is inherently unreliable, being AI-generated and likely unstable, and doesn't address the text it is supposed to support.
Line 202:
 
=== Alteration of public keys ===
Another potential security vulnerability in using asymmetric keys is the possibility of a [[Man-in-the-middle attack|"man-in-the-middle" attack]], in which the communication of public keys is intercepted by a third party (the "man in the middle") and then modified to provide different public keys instead. Encrypted messages and responses must, in all instances, be intercepted, decrypted, and re-encrypted by the attacker using the correct public keys for the different communication segments so as to avoid suspicion.<ref>{{Citecitation webneeded| |titlereason=Publicdeleted Key Encryption - an overview {{!}} ScienceDirect Topicsblog references|url=https://www.sciencedirect.com/topics/computer-science/public-key-encryption |access-date=2025-03-13January |website=www.sciencedirect.com2024}}</ref>
 
A communication is said to be insecure where data is transmitted in a manner that allows for interception (also called "[[Sniffing attack|sniffing]]"). These terms refer to reading the sender's private data in its entirety. A communication is particularly unsafe when interceptions can not be prevented or monitored by the sender.<ref>