Bonjour, Hodie XIV Kal. Iun. MMIX, naveen.bn scripsit: > Thank you for the reply. I was thinking that, if i ( A ) encrypt the > data with the public key from the certificate obtained from B, can the > intruder generate a private key using the public key from the same > certificate from B, which may lead to Man in Middle attack. > Please correct me if I am wrong .
The intruder can *not* generate the private key from the public key. -- Erwann ABALEA <erwann.aba...@keynectis.com> ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org