Man-in-the-middle attacks are a real threat to what type of communication?

A.
Communication based on random challenge.
B.
Communication based on face to face contact.
C.
Communication based on token.
D.
Communication based on asymmetric encryption.
Explanation:
The weakest point in the communication based on asymmetric encryption is the knowledge
about the real owners of keys. Somebody evil could generate a key pair, give the public
key away and tell everybody, that it belongs to somebody else. Now, everyone believing
it will use this key for encryption, resulting in the evil man being able to read the
messages. If he encrypts the messages again with the public key of the real recipient,
he will not be easily recognized. This sort of attack is called “man-in-the-middle”
attack and can only be prevented by making sure, public keys really belong to the one
being designated as owner.
check
0
0
There is no one single method of MITM attacks. Essentially, the MITM becomes a proxy in the communications between two parties and the most common way of doing that is spoofing the MAC address of one of the party, i.e ARP poisoning which causes the traffic to come to them enabling them to take over the conversation..Read here for more details: http://www.infosecisland.com/blogview/10475-Man-in-the-Middle-MITM-Attacks-Explained.html
0
0