Search code examples
securitycryptographyman-in-the-middle

Man in Middle attack - Can such an attack occur if symmetric keys are used?


If we consider Man In the Middle Attack; Can such an attack occur if symmetric keys are used?


Solution

  • Sure. All you need to do is intercept the key exchange. Then you can pass on your own (fake) key to the other end. You intercept the messages using the key you obtained fraudulently and re-encrypt with your fake key and pass on to the other end.