Hardening a asymmetric key based authentication process
The process involves two interested parties A (client) and B (server) and the attacker M. M is capable of intercepting all the communication between A and B (Man in the Middle) and even modify it. However A’s private key has … Continue reading Hardening a asymmetric key based authentication process