On Thu, Apr 30, 2026 at 5:12 PM Jan Schaumann <jschauma=
[email protected]> wrote:

> "allows for an active quantum attack that achieves
> MITM,"
>
> "achieving MITM" doesn't seem quite accurate.  What's
> accomplished is a quantum attack to decrypt the data
> in transit, which, to me, anyway, is different from
> posing successfully as a MitM and is more of a
> successful eavesdrop.  Mallory has powers Eve does
> not, but a kex compromise only yields eavesdropping
> capability, no?
>

I tend to agree that MITM isn't quite the right term here.

If you have access to the traffic keys you certainly can mount
a MITM attack, but you can also just take over the connection
and impersonate the server entirely, or, as you suggest,
just eavesdrop.

-Ekr
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to