First page Back Continue Last page Overview Graphics
Key Distribution - MITM
Passive stiffing is no problem.
 
If packets can be intercepted  they can substitute a different key.
 
The attacker uses a separate key to talk to each party.
 
You think you're talking  over a secure channel, but in fact you're talking to an attacker.