SlideShare a Scribd company logo
Describe in detail a man-in-the-middle attack on the Diffie-Hellman key-exchange protocol
whereby the adversary ends up sharing a key k A with Alice and a different key k B with Bob, and
Alice and Bob cannot detect that anything has gone wrong.
What happens if Alice and Bob try to detect the presence of a man-in-the-middle adversary by
sending each other (encrypted) questions that only the other party would know how to answer?
Solution
In man-in-the-middle attack, an opponent Eve intercepts Alice's public key K A and sends her
own public key as K A to Bob. When Bob transmits his public key K B , Eve substitutes it with
her own and sends it as K B to Alice. Eve and Alice thus agree on one shared key and Eve and
Bob agree on another shared key. After this exchange, Eve simply decrypts any messages sent
out by Alice or Bob, and then reads and possibly modifies them before re-encrypting with the
appropriate key and transmitting them to the other party. This vulnerability is present because
Diffie-Hellman key exchange does not authenticate the participants. The man-in-the-middle
attack may be prevented by using digital signatures and other cryptographic schemes.
Bob to encrypt a message so that only Alice will be able to decrypt it, with no prior
communication between them other than Bob having trusted knowledge of Alice's public key.
Alice's public key is
g K
A mod p, g,p. . To send her a message, Bob chooses a random K B and then sends Alice g K
B
mod p
together with the message encrypted with ( g K
A ) K
B mod p symmetric key. Only Alice can
determine the symmetric key and hence decrypt the message because only she has K A.
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx

More Related Content

More from earleanp

Describe the principal technologies that have shaped contemporary tele.docx
Describe the principal technologies that have shaped contemporary tele.docxDescribe the principal technologies that have shaped contemporary tele.docx
Describe the principal technologies that have shaped contemporary tele.docx
earleanp
 
Describe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docxDescribe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docx
earleanp
 
Describe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docxDescribe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docx
earleanp
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
earleanp
 
Describe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docxDescribe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docx
earleanp
 
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docxDescribe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
earleanp
 
Describe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docxDescribe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docx
earleanp
 
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docxDescribe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
earleanp
 
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docxDescribe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
earleanp
 
Describe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docxDescribe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docx
earleanp
 
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docxDescribe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docx
earleanp
 
Describe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docxDescribe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docx
earleanp
 
describe 5 factors that can affect the effective implementation of int.docx
describe 5 factors that can affect the effective implementation of int.docxdescribe 5 factors that can affect the effective implementation of int.docx
describe 5 factors that can affect the effective implementation of int.docx
earleanp
 
Define the following key data modeling terms- entity- attribute- relat.docx
Define the following key data modeling terms- entity- attribute- relat.docxDefine the following key data modeling terms- entity- attribute- relat.docx
Define the following key data modeling terms- entity- attribute- relat.docx
earleanp
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
earleanp
 
Define Cyber Security and its historySolutionPlease follow the data -.docx
Define Cyber Security and its historySolutionPlease follow the data -.docxDefine Cyber Security and its historySolutionPlease follow the data -.docx
Define Cyber Security and its historySolutionPlease follow the data -.docx
earleanp
 
Data Mining In your opinion- what would be the cons and pros of using.docx
Data Mining In your opinion- what would be the cons and pros of using.docxData Mining In your opinion- what would be the cons and pros of using.docx
Data Mining In your opinion- what would be the cons and pros of using.docx
earleanp
 
Danny Venable- the new controller of Seratelli Company- has reviewed t.docx
Danny Venable- the new controller of Seratelli Company- has reviewed t.docxDanny Venable- the new controller of Seratelli Company- has reviewed t.docx
Danny Venable- the new controller of Seratelli Company- has reviewed t.docx
earleanp
 
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docxD-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
earleanp
 
Cryptography and network security by Stallings- Question 4- (a) Is it.docx
Cryptography and network security by Stallings- Question 4- (a) Is it.docxCryptography and network security by Stallings- Question 4- (a) Is it.docx
Cryptography and network security by Stallings- Question 4- (a) Is it.docx
earleanp
 

More from earleanp (20)

Describe the principal technologies that have shaped contemporary tele.docx
Describe the principal technologies that have shaped contemporary tele.docxDescribe the principal technologies that have shaped contemporary tele.docx
Describe the principal technologies that have shaped contemporary tele.docx
 
Describe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docxDescribe the typical duties of a security manager that are strictly ma.docx
Describe the typical duties of a security manager that are strictly ma.docx
 
Describe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docxDescribe the four categories of international airports in the federal.docx
Describe the four categories of international airports in the federal.docx
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Describe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docxDescribe the different metrics that BGP can use in building a routing.docx
Describe the different metrics that BGP can use in building a routing.docx
 
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docxDescribe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
 
Describe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docxDescribe the different types of qualitative analysis and indicate whic.docx
Describe the different types of qualitative analysis and indicate whic.docx
 
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docxDescribe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
 
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docxDescribe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
 
Describe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docxDescribe core competencies and their relationship to operations manage.docx
Describe core competencies and their relationship to operations manage.docx
 
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docxDescribe events that led to the signing of the Homeland Security Act 2.docx
Describe events that led to the signing of the Homeland Security Act 2.docx
 
Describe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docxDescribe an experiment that disproved the theory of classical mechanic.docx
Describe an experiment that disproved the theory of classical mechanic.docx
 
describe 5 factors that can affect the effective implementation of int.docx
describe 5 factors that can affect the effective implementation of int.docxdescribe 5 factors that can affect the effective implementation of int.docx
describe 5 factors that can affect the effective implementation of int.docx
 
Define the following key data modeling terms- entity- attribute- relat.docx
Define the following key data modeling terms- entity- attribute- relat.docxDefine the following key data modeling terms- entity- attribute- relat.docx
Define the following key data modeling terms- entity- attribute- relat.docx
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
 
Define Cyber Security and its historySolutionPlease follow the data -.docx
Define Cyber Security and its historySolutionPlease follow the data -.docxDefine Cyber Security and its historySolutionPlease follow the data -.docx
Define Cyber Security and its historySolutionPlease follow the data -.docx
 
Data Mining In your opinion- what would be the cons and pros of using.docx
Data Mining In your opinion- what would be the cons and pros of using.docxData Mining In your opinion- what would be the cons and pros of using.docx
Data Mining In your opinion- what would be the cons and pros of using.docx
 
Danny Venable- the new controller of Seratelli Company- has reviewed t.docx
Danny Venable- the new controller of Seratelli Company- has reviewed t.docxDanny Venable- the new controller of Seratelli Company- has reviewed t.docx
Danny Venable- the new controller of Seratelli Company- has reviewed t.docx
 
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docxD-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
D-7-17 Interface an 8-bit serial device using SPI- Thecontrol pin is i.docx
 
Cryptography and network security by Stallings- Question 4- (a) Is it.docx
Cryptography and network security by Stallings- Question 4- (a) Is it.docxCryptography and network security by Stallings- Question 4- (a) Is it.docx
Cryptography and network security by Stallings- Question 4- (a) Is it.docx
 

Recently uploaded

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx

  • 1. Describe in detail a man-in-the-middle attack on the Diffie-Hellman key-exchange protocol whereby the adversary ends up sharing a key k A with Alice and a different key k B with Bob, and Alice and Bob cannot detect that anything has gone wrong. What happens if Alice and Bob try to detect the presence of a man-in-the-middle adversary by sending each other (encrypted) questions that only the other party would know how to answer? Solution In man-in-the-middle attack, an opponent Eve intercepts Alice's public key K A and sends her own public key as K A to Bob. When Bob transmits his public key K B , Eve substitutes it with her own and sends it as K B to Alice. Eve and Alice thus agree on one shared key and Eve and Bob agree on another shared key. After this exchange, Eve simply decrypts any messages sent out by Alice or Bob, and then reads and possibly modifies them before re-encrypting with the appropriate key and transmitting them to the other party. This vulnerability is present because Diffie-Hellman key exchange does not authenticate the participants. The man-in-the-middle attack may be prevented by using digital signatures and other cryptographic schemes. Bob to encrypt a message so that only Alice will be able to decrypt it, with no prior communication between them other than Bob having trusted knowledge of Alice's public key. Alice's public key is g K A mod p, g,p. . To send her a message, Bob chooses a random K B and then sends Alice g K B mod p together with the message encrypted with ( g K A ) K B mod p symmetric key. Only Alice can determine the symmetric key and hence decrypt the message because only she has K A.