Describe a maninthemiddle attack for DiffieHellmanSolutionFi
Describe a man-in-the-middle attack for Diffie-Hellman.
Solution
First let us see what is man-in-middle attack, it could be easily understood if you understand the concept of masking.
Consider A and B are two participants who wants to exchange message but a third participant C comes in picture which takes A\'s public value and sends it own public value to B and then while B send its public C take that and sends its own value to A and then whenever A and B pass on the messgae to each other C decrypts those messages and alter the message accoding to it.In this way C(man) sits in middle of A and B and keeps on taking thier messages where A and B thinks they are passing messgae to each other and aren\'t aware about C. Diffie-Hellman is most vulenrable to this attack becuase this key exchange method doesnot autheticate the participants.
