How to exploit Diffie-hellman to perform a man in the middle attack
- by jfisk
Im doing a project where Alice and Bob send each other messages using the Diffie-Hellman key-exchange. What is throwing me for a loop is how to incorporate the certificate they are using in this so i can obtain their secret messages.
From what I understand about MIM attakcs, the MIM acts as an imposter as seen on this diagram:
Below are the…