2

Trying to turn bookish knowledge to practical:

Alice sends half of the encrypted data to eve, eve eavesdrop and tries to decrypt the data and fails as eve has only half of the encrypted block. So, Eve creates a new message and sends the data to Bob

  1. why do most documents say about altering the message content by the attacker?

  2. can't the hacker just keep a copy of encrypted block and send the encrypted original data to bob?

  3. Why does a MitM presence interrupt the network? for example, Wireshark captures the packets but still, the actual recipient receives the packet

  4. Could an interlock system be susceptible to passive attack?
  5. Can Eve send the original data without altering the message content, and keep a copy of it to integrate it with the remaining message blocks
kelalaka
  • 48,443
  • 11
  • 116
  • 196
PDHide
  • 247
  • 4
  • 12
  • 2
  • When I altered and you assumed it is valid, you are my puppet. 2) look for active attacker vs Passive attacker. 3) MITM requires an active attacker, you use the WhireShark as a passive attacker.
  • – kelalaka Jan 03 '19 at 00:17
  • Thank you so much for the comment, could an interlock system be susceptible to passive attack? does listening to a communication channel and decrypting the data be considered as an active attack? – PDHide Jan 03 '19 at 00:24
  • Can Eve send the original data without altering the message content, and keep a copy of it to integrate it with the remaining message blocks – PDHide Jan 03 '19 at 00:38
  • 1
    "middle in the man attack" is non-standard. The standard term is Man in the Middle attack (MitM). – fgrieu Jan 03 '19 at 09:14