4

This shithead continuously wasted 2 lectures of CNS(Cryptography and Network Security) on debating: in a link to link encrytion if encryption and decryption takes place on every node, what if attacker attacks the node while the data is decrypted.

Though I couldn't care less about the lecture but this guy brings the same issue in every lecture

Do anyone have any idea about the link to link encryption?

I know already it encrypts the whole packet with header and on each hop the data is decrypted and the destination ip address is fetched and encrypted again, but i don't know if it's possible to perform an attack on the decrypted data.

Comments
  • 0
    Its possible, but there are methods to avoid this(tor, end-to-end for data, ...)
  • 0
    Thank you @stop for replying, but I m not after on how to avoid the issue.
    What i want to know if that kind of thing is possible or not, if possible then why it is/was used in the first place?
  • 0
    try to find an article to the german Bea ("Besonderes Anwaltspostfach"), they have implemented such an thing.
Add Comment