section 10.1 describes a man in the middle attack on the diffie-hellman key exhange protocal in which the adversary generates two public private key pairs for the attack. could the same attack be accomplished with one pair?