What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?
A.
Session hijacking
B.
Lack of authentication
C.
Repeated initialization vector values
D.
Symmetric key must be encrypted
What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?
What is necessary for a successful man-in-the-middle attack on the Diffie-Hellman algorithm?
A.
Session hijacking
B.
Lack of authentication
C.
Repeated initialization vector values
D.
Symmetric key must be encrypted
B. Lack of authentication
Are you sure? I think A should be the right answer. Afterall, a man-in-the-middle attack is a form of session hijacking.
Admin: Please fix, the answer is “B”
Matt, the key is that the attack is against the DH Algo.