Public Key Deception
Impostor Claims to be a True Party
- True party has a public and private key
- Impostor also has a public and private key
Impostor sends impostor’s own public key to the verifier
- Says, “This is the true party’s public key”
- This is the critical step in the deception