Demo 1 voice

Profile photo for Pradhish Sunil
Not Yet Rated
0:00
Video Narration
1
0

Description

This sample voice is about mitm(man in middle)
attack

Vocal Characteristics

Language

English

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
man in the middle attack in cryptography and computer security. A man in the middle attack. My DM is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. One example of a mighty M attack is active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection. When in fact the entire conversation is controlled by the attacker, the attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances. For example, an attacker within reception range of an unencrypted wifi access point could insert themselves as a man in the middle as it aims to circumvent mutual authentication. A mighty M attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent medium attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority