Watch this video on YouTube
When key distribution is not adequately secured, a cryptographic system becomes vulnerable to which security threat?