In this scenario, the attacker attempts to intercept the
public key exchange between the pairing entities.
Through the ESSP method, the attacker will fail to attack
because the public keys are authenticated and stored
through Phase One of the ESSP, as shown in Figure 4
below[11].