How to prevent a man-in-the-middle attack in case of a hacked server?

Imagine that the server is serving the public keys of users to its partners to make encrypted communication possible. However, the server does NOT have access to private keys.

In any case, imagine that the server is hacked and it sends unsolicited public keys:

Alice asks Bob for the public key
    Server sends the public key to Eve

Bob asks Alice's public key
    Server sends Eve's public key

Alice sent a message to Bob. The server unpacks the message, reads it and repacks → sends it to Bob ...

Bob sends a message to Alice.
    The server unpacks the message, reads it and repacks → sends Alice ...

My question is: how to prevent such abuse? How can Alice be sure that she uses Bob's public key and vice versa?

+3
source share
4 answers

According to the scheme that you just proposed, you cannot. The key is here (no pun intended), if the method used to validate the keys is compromised, you lose.

SSL , - ( ) , , . , ( ) , , , .

PGP ( GPG) , - , ( ). , , , . , N (/ M ).

, , , . , , -, ...

, - ... /// :)

+8

, , - . , Bobs. , .

Web of Trust. , , . (3) ( ) , , .

+2

. , , , . , HTTPS/SSL , - . , , , . , - , . , , , , . , , , . , , .

0
source

The FAQ for PGP (Pretty Good Privacy) explains this problem.

I would also recommend reading Bruce Schneier’s excellent book , Applied Cryptography, for “friendly and digestible” discussions of these topics.

0
source

Source: https://habr.com/ru/post/1762064/


All Articles