Suppose User_A has successfully deceived User_B by making User_B trust that User_A’s public key is User_C’s public key. That is, when User_B looks up User_C’s public key in its public key table, User_B will find User_A’s public key instead. Explain what attacks User_A may further launch against User_B. Give details of two types of attacks based on an incorrect public key.
`Hey,
Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.
Kindly revert for any queries
Thanks.
Get Answers For Free
Most questions answered within 1 hours.