1

ephemeral-ephemeral ECDH is it susceptible to MITM attack ? if yes, can you please give me a detailed answer ( Workflow that can be followed by the attacker) and how we can prevent this attack (static-ephemeral or we can keep ephemeral-ephemeral and change some parameters)?

Thank you in advance

SingaCpp
  • 73
  • 4

0 Answers0