Public Key Deception
If verifier accepts the impostor’s public key as the true party’s public key,
- Impostor will be authenticated through any public key authentication method, because their private key will work
- Impostor can also decrypt messages sent by the verifier if these messages are encrypted with the impostor’s public key