ABSTRACT
This chapter considers some active attacks in which the attacker takes some action to fool the victim, causing an error, obtaining a key, or introducing his own devious message which others accept as authentic.
This chapter considers some active attacks in which the attacker takes some action to fool the victim, causing an error, obtaining a key, or introducing his own devious message which others accept as authentic.