First page Back Continue Last page Overview Graphics
Key Distribution - MITM
Passive stiffing is no problem.
If packets can be intercepted they can substitute a different key.
The attacker uses a separate key to talk to each party.
You think you're talking over a secure channel, but in fact you're talking to an attacker.