First page Back Continue Last page Overview Graphics
Key Distribution - MITM
- Passive stiffing is no problem.
- If packets can be intercepted  they can substitute a different key.
- The attacker uses a separate key to talk to each party.
- You think you're talking  over a secure channel, but in fact you're talking to an attacker.