The Man in the Middle Attack

After their first system was broken, instead of talking on the phone, Michael and Nikita can now only communicate via text messages. One of her captors, The Man, is watching each of the transmissions; moreover, he can intercept messages and send false messages. When Nikita sends a message to Michael announcing $ g^n\pmod{p}$ , The Man intercepts this message, and sends his own number $ g^t\pmod{p}$ to Michael. Eventually, Michael and The Man agree on the secret key $ g^{tm}\pmod{p}$ , and Nikita and The Man agree on the key $ g^{tn}\pmod{p}$ . When Nikita sends a message to Michael she unwittingly uses the secret key $ g^{tn}\pmod{p}$ ; The Man then intercepts it, decrypts it, changes it, and re-encrypts it using the key $ g^{tm}\pmod{p}$ , and sends it on to Michael. This is bad because now The Man can read every message sent between Michael and Nikita, and moreover, he can change them in transmission in subtle ways.
Figure 3.3: The Man in the Middle Attack
\includegraphics[width=\textwidth]{graphics/man.eps}

One way to get around this attack is to use a digital signature scheme based on the RSA cryptosystem. We will not discuss digital signatures further in this book, but will discuss RSA in the next section.

William 2007-06-01