security - Protecting ECDH against MITM attacks -


I am working on a project that requires ECDH key exchange. I am trying to understand how to be protected from MITM attacks. I can sign the public key and send a signature with the public key transfer to ensure that the key has not been tampered with, but this does not stop MITM attack from doing the same thing. That a key exchange should be confirmed by a third party, but I am finding it difficult to understand how it happens that a third party Can assume that no MITM can attack, why can not MITM on third party verification? Is there really a failed proven method of destroying all possible MITM attacks without pre-known by either side of any kind?

You need a trusted third party to sign both keys is.

There is no way to distinguish between the identity of the memorandum or the desired partner without any claim.

One or more a bob

Comments

Popular posts from this blog

mysql - BLOB/TEXT column 'value' used in key specification without a key length -

c# - Using Vici cool Storage with monodroid -

python - referencing a variable in another function? -