ABSTRACT

This chapter considers some active attacks in which the attacker takes some action to fool the victim, causing an error, obtaining a key, or introducing his own devious message which others accept as authentic.