Chapter 8: Problem 5
Alice wants to communicate with the www.vunl Web site, but the entry for this domain in her name server was poisoned so that the packets end up at an attacker-controlled machine. To what extent is the attacker able to compromise Confidentiality, Integrity, and Authenticity in the following cases: (a) unencrypted (http) communication between Alice and www.vu.nl, (b) encrypted (https) communication between Alice and www.vu.nl when the Web site uses a self-signed certificate, (c) encrypted (https) communication between Alice and www.vu nl when the Web site uses a certificate signed by a legitimate certificate authority?
Short Answer
Step by step solution
Key Concepts
These are the key concepts you need to understand to accurately answer the question.