Public Key Deception
“Here is TP’s public key.”
(Sends Impostor’s public key)
based on TP’s private key.”
(Really Impostor’s private key)
Decryption of message from Verifier
encrypted with Impostor’s public key,
so Impostor can decrypt it
Must authenticate True Person.
based on Impostor’s public key
here is a message encrypted