We help IT Professionals succeed at work.

!! Man-in-middle - Attack against Diffie-Hellman !!

Frohike
Frohike asked
on
Dear Expert,

I'm having certain difficulties in trying to convince myself in understanding the "man-in-middle" attack against the Diffie-Hellman Algorithm.

Are you able to explain it to me in detail using layman's terms, and perhaps also where on the Internet I might be able to read up more about the subject?

Many thanks,

Frohike
Comment
Watch Question

Commented:
http://www.encryption.com/rsalabs/faq/3-6-1.html will give you a decent explanation.

Commented:
the primary function of a man-in-the-middle attack against any encryption based trasaction is to proxy...so that the basic flow is as follows:

  - requestor sends request
  - mitm receives request
  - mitm requests from valid service
  - valid service responds to mitm
  - mitm submits response back to requestor

with encryption (whether it be shared key or public/private) there are 2 sets of key exchanges: one between the requestor and the mitm and another between the mitm and the valid service.

Author

Commented:
This was exactly what I had been looking for. The explanation is excellent and I understood it from top to bottom. Thank you for your help!

Explore More ContentExplore courses, solutions, and other research materials related to this topic.