Bonjour,

Hodie XIV Kal. Iun. MMIX, naveen.bn scripsit:
>    Thank you for the reply. I was thinking that, if i ( A )  encrypt  the
>    data with the public key from the certificate obtained from B,  can the
>    intruder  generate a  private  key using the  public key from the same
>    certificate from B, which may lead to Man in Middle attack.
>    Please correct me if I am wrong .

The intruder can *not* generate the private key from the public key.

-- 
Erwann ABALEA <erwann.aba...@keynectis.com>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to