File:WBC 1.jpg
Summary
| Description |
English: The secret key(s) are kept in a trusted location and are reachable only by the sender and the receiver. If attackers get the keys and intercept the traffic, they can not only decrypt it but also modify and encrypt again, thus sending malicious traffic to the receiver. |
| Date | |
| Source | Embedded Solutions 3000 library |
| Author | Dr. Larisa Tsirinsky |
Licensing
This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.
- You are free:
- to share – to copy, distribute and transmit the work
- to remix – to adapt the work
- Under the following conditions:
- attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.