What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?

What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?

What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?

A.
Session hijacking

B.
Lack of authentication

C.
Repeated initialization vector values

D.
Symmetric key must be encrypted



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Sachin

Sachin

B. Lack of authentication

Matt

Matt

Are you sure? I think A should be the right answer. Afterall, a man-in-the-middle attack is a form of session hijacking.

Michael McNeil

Michael McNeil

Admin: Please fix, the answer is “B”

Matt, the key is that the attack is against the DH Algo.