How to Stop Man in the Middle Attacks Part 3

You may have heard of something called a “trusted third party” before while using a web browser. This is usually used in reference to security certificates. This might seem confusing at first but it’s actually very simple.

The situation:
Alice and Bob have come up with a nearly fool proof way to stop people from eavesdropping on them. The last thing they need to do is get Alice’s public key to Bob through Mallory without Mallory modifying the key or replacing it.

To do this they use Trent. Trent has started his own business of securely transmitting public keys for people.

The idea is that everyone already has Trent’s public key. Alice simply needs to securely send her public key over to Trent and he’ll sign it with his public key and send it out to anyone who asks for it. This way Bob doesn’t need to have Alice’s public key ahead of time just to be able to create an encrypted connection with her.

5 thoughts on “How to Stop Man in the Middle Attacks Part 3

  1. Howdy! This is kind of off topic but I need some guidance from an established blog.
    Is it hard to set up your own blog? I’m not very techincal but I can figure things out pretty quick.
    I’m thinking about setting up my own but I’m not sure where to start.
    Do you have any tips or suggestions? Cheers

  2. whoah this weblog is fantastic i really like studying your posts.
    Stay up the good work! You already know, lots
    of individuals are hunting round for this info, you could help them greatly.

  3. Pingback: 他妈的谷歌
  4. Hi! Quick question that’s completely off topic. Do you know
    how to make your site mobile friendly? My blog looks weird
    when browsing from my apple iphone. I’m trying
    to find a theme or plugin that might be able to fix this problem.
    If you have any suggestions, please share. Thank you!

  5. Your method of telling the whole thing in this piece of writing is genuinely nice, all be able to easily understand
    it, Thanks a lot.

Leave a Reply

Your email address will not be published. Required fields are marked *

Please prove that you are not a spam-bot *