Content deleted Content added
Added citation Tags: Reverted use of deprecated (unreliable) source Visual edit |
Undid revision 1280246080 by MofeO (talk). This source is inherently unreliable, being AI-generated and likely unstable, and doesn't address the text it is supposed to support. |
||
Line 202:
=== Alteration of public keys ===
Another potential security vulnerability in using asymmetric keys is the possibility of a [[Man-in-the-middle attack|"man-in-the-middle" attack]], in which the communication of public keys is intercepted by a third party (the "man in the middle") and then modified to provide different public keys instead. Encrypted messages and responses must, in all instances, be intercepted, decrypted, and re-encrypted by the attacker using the correct public keys for the different communication segments so as to avoid suspicion.
A communication is said to be insecure where data is transmitted in a manner that allows for interception (also called "[[Sniffing attack|sniffing]]"). These terms refer to reading the sender's private data in its entirety. A communication is particularly unsafe when interceptions can not be prevented or monitored by the sender.<ref>
|