SlideShare a Scribd company logo
Besides using the certificates, suggest alternate method to avoid the man-in-the-middle attack in
key exchange between Alice and Bob.
Solution
In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM,
MiM attack, MitMA or the same using all capital letters) is an attack where the attacker secretly
relays and possibly alters the communication between two parties who believe they are directly
communicating with each other. A man-in-the-middle attack can be used against many
cryptographic protocols. One example of man-in-the-middle attacks is active eavesdropping, in
which the attacker makes independent connections with the victims and relays messages between
them to make them believe they are talking directly to each other over a private connection,
when in fact the entire conversation is controlled by the attacker. The attacker must be able to
intercept all relevant messages passing between the two victims and inject new ones. This is
straightforward in many circumstances; for example, an attacker within reception range of an
unencrypted Wi-Fi wireless access point can insert himself as a man-in-the-middle.
As an attack that aims at circumventing mutual authentication, or lack thereof, a man-in-the-
middle attack can succeed only when the attacker can impersonate each endpoint to their
satisfaction as expected from the legitimate other end. Most cryptographic protocols include
some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS
can authenticate one or both parties using a mutually trusted certificate authority
Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the
conversation to eavesdrop and optionally to deliver a false message to Bob.
First, Alice asks Bob for his public key. If Bob sends his public key to Alice, but Mallory is able
to intercept it, a man-in-the-middle attack can begin. Mallory sends a forged message to Alice
that purports to come from Bob, but instead includes Mallory's public key.
Alice, believing this public key to be Bob's, encrypts her message with Mallory's key and sends
the enciphered message back to Bob. Mallory again intercepts, deciphers the message using her
private key, possibly alters it if she wants, and re-enciphers it using the public key Bob originally
sent to Alice. When Bob receives the newly enciphered message, he believes it came from Alice.
1. Alice sends a message to Bob, which is intercepted by Mallory:
Alice "Hi Bob, it's Alice. Give me your key." Mallory Bob
2. Mallory relays this message to Bob; Bob cannot tell it is not really from Alice:
Alice Mallory "Hi Bob, it's Alice. Give me your key." Bob
3. Bob responds with his encryption key:
Alice Mallory [Bob's key] Bob
4. Mallory replaces Bob's key with her own, and relays this to Alice, claiming that it is Bob's
key:
Alice [Mallory's key] Mallory Bob
5. Alice encrypts a message with what she believes to be Bob's key, thinking that only Bob can
read it:
Alice "Meet me at the bus stop!" [encrypted with Mallory's key] Mallory Bob
6. However, because it was actually encrypted with Mallory's key, Mallory can decrypt it, read
it, modify it (if desired), re-encrypt with Bob's key, and forward it to Bob:
Alice Mallory "Meet me at the van down by the river!" [encrypted with Bob's key] Bob
7. Bob thinks that this message is a secure communication from Alice.
8. Bob goes to the van down by the river and gets robbed by Mallory.
This example shows the need for Alice and Bob to have some way to ensure that they are truly
using each other's public keys, rather than the public key of an attacker. Otherwise, such attacks
are generally possible, in principle, against any message sent using public-key technology.
Fortunately, a variety of techniques can help defend against MITM attacks.
The Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack. In this attack, an
opponent Carol intercepts Alice's public value and sends her own public value to Bob. When
Bob transmits his public value, Carol substitutes it with her own and sends it to Alice. Carol and
Alice thus agree on one shared key and Carol and Bob agree on another shared key. After this
exchange, Carol simply decrypts any messages sent out by Alice or Bob, and then reads and
possibly modifies them before re-encrypting with the appropriate key and transmitting them to
the other party. This vulnerability is present because Diffie-Hellman key exchange does not
authenticate the participants. Possible solutions include the use of digital signatures and other
protocol variants

More Related Content

More from arhamnighty

Use attached Table A-2 for Normal Distribution to find the critical .pdf
Use attached Table A-2 for Normal Distribution to find the critical .pdfUse attached Table A-2 for Normal Distribution to find the critical .pdf
Use attached Table A-2 for Normal Distribution to find the critical .pdf
arhamnighty
 
Based on the data provided through the U.S. Department of the Treasu.pdf
Based on the data provided through the U.S. Department of the Treasu.pdfBased on the data provided through the U.S. Department of the Treasu.pdf
Based on the data provided through the U.S. Department of the Treasu.pdf
arhamnighty
 
Trace the major historical developments of hospitals in the United S.pdf
Trace the major historical developments of hospitals in the United S.pdfTrace the major historical developments of hospitals in the United S.pdf
Trace the major historical developments of hospitals in the United S.pdf
arhamnighty
 
The role of Ca2+ in the control of muscle contraction is to1. caus.pdf
The role of Ca2+ in the control of muscle contraction is to1. caus.pdfThe role of Ca2+ in the control of muscle contraction is to1. caus.pdf
The role of Ca2+ in the control of muscle contraction is to1. caus.pdf
arhamnighty
 
The following data. recorded in days, represent the length of time to.pdf
The following data. recorded in days, represent the length of time to.pdfThe following data. recorded in days, represent the length of time to.pdf
The following data. recorded in days, represent the length of time to.pdf
arhamnighty
 
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdf
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdfSuppose that A and B are in DSPACE(n). Prove that the following lang.pdf
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdf
arhamnighty
 
Some new protocols such as Internet Protocol (IP) version 6 are not .pdf
Some new protocols such as Internet Protocol (IP) version 6 are not .pdfSome new protocols such as Internet Protocol (IP) version 6 are not .pdf
Some new protocols such as Internet Protocol (IP) version 6 are not .pdf
arhamnighty
 
Selection of favorite fruits and responses of orange, grape, apple, .pdf
Selection of favorite fruits and responses of orange, grape, apple, .pdfSelection of favorite fruits and responses of orange, grape, apple, .pdf
Selection of favorite fruits and responses of orange, grape, apple, .pdf
arhamnighty
 
RNA and DNA differRNA and DNA differE-All of these are correct..pdf
RNA and DNA differRNA and DNA differE-All of these are correct..pdfRNA and DNA differRNA and DNA differE-All of these are correct..pdf
RNA and DNA differRNA and DNA differE-All of these are correct..pdf
arhamnighty
 
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdf
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdfPropose a pathway(s) to explain how the ectoderm and the notochord b.pdf
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdf
arhamnighty
 
Potassium has one electron in its outer shell. Which of the followin.pdf
Potassium has one electron in its outer shell. Which of the followin.pdfPotassium has one electron in its outer shell. Which of the followin.pdf
Potassium has one electron in its outer shell. Which of the followin.pdf
arhamnighty
 
please use poisson probabilities. Chicago Tribune-Julius Peppers 1.pdf
please use poisson probabilities.   Chicago Tribune-Julius Peppers 1.pdfplease use poisson probabilities.   Chicago Tribune-Julius Peppers 1.pdf
please use poisson probabilities. Chicago Tribune-Julius Peppers 1.pdf
arhamnighty
 
Match the terms below with their definition. Solution1.) Budge.pdf
Match the terms below with their definition.  Solution1.) Budge.pdfMatch the terms below with their definition.  Solution1.) Budge.pdf
Match the terms below with their definition. Solution1.) Budge.pdf
arhamnighty
 
I have the shell for this program already, I just need the two sub-f.pdf
I have the shell for this program already, I just need the two sub-f.pdfI have the shell for this program already, I just need the two sub-f.pdf
I have the shell for this program already, I just need the two sub-f.pdf
arhamnighty
 
How to determine the shear stress for plastic deformation to happen.pdf
How to determine the shear stress for plastic deformation to happen.pdfHow to determine the shear stress for plastic deformation to happen.pdf
How to determine the shear stress for plastic deformation to happen.pdf
arhamnighty
 
How many bacteria need to be ingested to cause a salmonella typhi.pdf
How many bacteria need to be ingested to cause a salmonella typhi.pdfHow many bacteria need to be ingested to cause a salmonella typhi.pdf
How many bacteria need to be ingested to cause a salmonella typhi.pdf
arhamnighty
 
How does cognition contribute to risky behaviorWrite 150 words.pdf
How does cognition contribute to risky behaviorWrite 150 words.pdfHow does cognition contribute to risky behaviorWrite 150 words.pdf
How does cognition contribute to risky behaviorWrite 150 words.pdf
arhamnighty
 
Five friends are gathered, each with a die. They each roll a die. Wh.pdf
Five friends are gathered, each with a die. They each roll a die. Wh.pdfFive friends are gathered, each with a die. They each roll a die. Wh.pdf
Five friends are gathered, each with a die. They each roll a die. Wh.pdf
arhamnighty
 
Explain why the matrices are or are not invertible Explain in words .pdf
Explain why the matrices are or are not invertible Explain in words .pdfExplain why the matrices are or are not invertible Explain in words .pdf
Explain why the matrices are or are not invertible Explain in words .pdf
arhamnighty
 
Describe the differences between a securely, insecure-avoidant, inse.pdf
Describe the differences between a securely, insecure-avoidant, inse.pdfDescribe the differences between a securely, insecure-avoidant, inse.pdf
Describe the differences between a securely, insecure-avoidant, inse.pdf
arhamnighty
 

More from arhamnighty (20)

Use attached Table A-2 for Normal Distribution to find the critical .pdf
Use attached Table A-2 for Normal Distribution to find the critical .pdfUse attached Table A-2 for Normal Distribution to find the critical .pdf
Use attached Table A-2 for Normal Distribution to find the critical .pdf
 
Based on the data provided through the U.S. Department of the Treasu.pdf
Based on the data provided through the U.S. Department of the Treasu.pdfBased on the data provided through the U.S. Department of the Treasu.pdf
Based on the data provided through the U.S. Department of the Treasu.pdf
 
Trace the major historical developments of hospitals in the United S.pdf
Trace the major historical developments of hospitals in the United S.pdfTrace the major historical developments of hospitals in the United S.pdf
Trace the major historical developments of hospitals in the United S.pdf
 
The role of Ca2+ in the control of muscle contraction is to1. caus.pdf
The role of Ca2+ in the control of muscle contraction is to1. caus.pdfThe role of Ca2+ in the control of muscle contraction is to1. caus.pdf
The role of Ca2+ in the control of muscle contraction is to1. caus.pdf
 
The following data. recorded in days, represent the length of time to.pdf
The following data. recorded in days, represent the length of time to.pdfThe following data. recorded in days, represent the length of time to.pdf
The following data. recorded in days, represent the length of time to.pdf
 
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdf
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdfSuppose that A and B are in DSPACE(n). Prove that the following lang.pdf
Suppose that A and B are in DSPACE(n). Prove that the following lang.pdf
 
Some new protocols such as Internet Protocol (IP) version 6 are not .pdf
Some new protocols such as Internet Protocol (IP) version 6 are not .pdfSome new protocols such as Internet Protocol (IP) version 6 are not .pdf
Some new protocols such as Internet Protocol (IP) version 6 are not .pdf
 
Selection of favorite fruits and responses of orange, grape, apple, .pdf
Selection of favorite fruits and responses of orange, grape, apple, .pdfSelection of favorite fruits and responses of orange, grape, apple, .pdf
Selection of favorite fruits and responses of orange, grape, apple, .pdf
 
RNA and DNA differRNA and DNA differE-All of these are correct..pdf
RNA and DNA differRNA and DNA differE-All of these are correct..pdfRNA and DNA differRNA and DNA differE-All of these are correct..pdf
RNA and DNA differRNA and DNA differE-All of these are correct..pdf
 
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdf
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdfPropose a pathway(s) to explain how the ectoderm and the notochord b.pdf
Propose a pathway(s) to explain how the ectoderm and the notochord b.pdf
 
Potassium has one electron in its outer shell. Which of the followin.pdf
Potassium has one electron in its outer shell. Which of the followin.pdfPotassium has one electron in its outer shell. Which of the followin.pdf
Potassium has one electron in its outer shell. Which of the followin.pdf
 
please use poisson probabilities. Chicago Tribune-Julius Peppers 1.pdf
please use poisson probabilities.   Chicago Tribune-Julius Peppers 1.pdfplease use poisson probabilities.   Chicago Tribune-Julius Peppers 1.pdf
please use poisson probabilities. Chicago Tribune-Julius Peppers 1.pdf
 
Match the terms below with their definition. Solution1.) Budge.pdf
Match the terms below with their definition.  Solution1.) Budge.pdfMatch the terms below with their definition.  Solution1.) Budge.pdf
Match the terms below with their definition. Solution1.) Budge.pdf
 
I have the shell for this program already, I just need the two sub-f.pdf
I have the shell for this program already, I just need the two sub-f.pdfI have the shell for this program already, I just need the two sub-f.pdf
I have the shell for this program already, I just need the two sub-f.pdf
 
How to determine the shear stress for plastic deformation to happen.pdf
How to determine the shear stress for plastic deformation to happen.pdfHow to determine the shear stress for plastic deformation to happen.pdf
How to determine the shear stress for plastic deformation to happen.pdf
 
How many bacteria need to be ingested to cause a salmonella typhi.pdf
How many bacteria need to be ingested to cause a salmonella typhi.pdfHow many bacteria need to be ingested to cause a salmonella typhi.pdf
How many bacteria need to be ingested to cause a salmonella typhi.pdf
 
How does cognition contribute to risky behaviorWrite 150 words.pdf
How does cognition contribute to risky behaviorWrite 150 words.pdfHow does cognition contribute to risky behaviorWrite 150 words.pdf
How does cognition contribute to risky behaviorWrite 150 words.pdf
 
Five friends are gathered, each with a die. They each roll a die. Wh.pdf
Five friends are gathered, each with a die. They each roll a die. Wh.pdfFive friends are gathered, each with a die. They each roll a die. Wh.pdf
Five friends are gathered, each with a die. They each roll a die. Wh.pdf
 
Explain why the matrices are or are not invertible Explain in words .pdf
Explain why the matrices are or are not invertible Explain in words .pdfExplain why the matrices are or are not invertible Explain in words .pdf
Explain why the matrices are or are not invertible Explain in words .pdf
 
Describe the differences between a securely, insecure-avoidant, inse.pdf
Describe the differences between a securely, insecure-avoidant, inse.pdfDescribe the differences between a securely, insecure-avoidant, inse.pdf
Describe the differences between a securely, insecure-avoidant, inse.pdf
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Besides using the certificates, suggest alternate method to avoid th.pdf

  • 1. Besides using the certificates, suggest alternate method to avoid the man-in-the-middle attack in key exchange between Alice and Bob. Solution In cryptography and computer security, a man-in-the-middle attack (often abbreviated MitM, MiM attack, MitMA or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. A man-in-the-middle attack can be used against many cryptographic protocols. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point can insert himself as a man-in-the-middle. As an attack that aims at circumventing mutual authentication, or lack thereof, a man-in-the- middle attack can succeed only when the attacker can impersonate each endpoint to their satisfaction as expected from the legitimate other end. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to eavesdrop and optionally to deliver a false message to Bob. First, Alice asks Bob for his public key. If Bob sends his public key to Alice, but Mallory is able to intercept it, a man-in-the-middle attack can begin. Mallory sends a forged message to Alice that purports to come from Bob, but instead includes Mallory's public key. Alice, believing this public key to be Bob's, encrypts her message with Mallory's key and sends the enciphered message back to Bob. Mallory again intercepts, deciphers the message using her private key, possibly alters it if she wants, and re-enciphers it using the public key Bob originally sent to Alice. When Bob receives the newly enciphered message, he believes it came from Alice. 1. Alice sends a message to Bob, which is intercepted by Mallory: Alice "Hi Bob, it's Alice. Give me your key." Mallory Bob 2. Mallory relays this message to Bob; Bob cannot tell it is not really from Alice: Alice Mallory "Hi Bob, it's Alice. Give me your key." Bob 3. Bob responds with his encryption key:
  • 2. Alice Mallory [Bob's key] Bob 4. Mallory replaces Bob's key with her own, and relays this to Alice, claiming that it is Bob's key: Alice [Mallory's key] Mallory Bob 5. Alice encrypts a message with what she believes to be Bob's key, thinking that only Bob can read it: Alice "Meet me at the bus stop!" [encrypted with Mallory's key] Mallory Bob 6. However, because it was actually encrypted with Mallory's key, Mallory can decrypt it, read it, modify it (if desired), re-encrypt with Bob's key, and forward it to Bob: Alice Mallory "Meet me at the van down by the river!" [encrypted with Bob's key] Bob 7. Bob thinks that this message is a secure communication from Alice. 8. Bob goes to the van down by the river and gets robbed by Mallory. This example shows the need for Alice and Bob to have some way to ensure that they are truly using each other's public keys, rather than the public key of an attacker. Otherwise, such attacks are generally possible, in principle, against any message sent using public-key technology. Fortunately, a variety of techniques can help defend against MITM attacks. The Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack. In this attack, an opponent Carol intercepts Alice's public value and sends her own public value to Bob. When Bob transmits his public value, Carol substitutes it with her own and sends it to Alice. Carol and Alice thus agree on one shared key and Carol and Bob agree on another shared key. After this exchange, Carol simply decrypts any messages sent out by Alice or Bob, and then reads and possibly modifies them before re-encrypting with the appropriate key and transmitting them to the other party. This vulnerability is present because Diffie-Hellman key exchange does not authenticate the participants. Possible solutions include the use of digital signatures and other protocol variants