There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?
No. The encryption methods are designed in a way that using a public key will not decrypt the message.
Confidentiality Integrity Availability
No. The encryption methods are designed in a way that using a public key will not decrypt the message.