Question 1 What actually are the public and private keys ? algorithms random symbols numbers computer programs
Question 2 What actually a MITM attack does ? MITM impersonates A for deceiving B and vice versa MITM decrypts data from A, alters it and retransmits it to B MITM steals the private key of one of the two entities MITM analyses the communication between A and B and breaks the public key of one of the two entities
Question 3 Which asymmetric encryption algorithm makes uses of big prime numbers ? Caesar cipher AES Blowfish RSA