I am new to ECC but I was wondering,
If there is a situation where instead of the ciphertext being falsified, the sent MAC was tampered. How does the receiver verify that the ciphertext is still correct? How can the receiver verify that only MAC is tampered with? How is it possible to know whether the sent MAC or Ciphertext is the one falsified?
If someone were to modify every MAC they can in a network, wouldn’t that stop communication in that network? How could one verify that the MACs aren’t tampered with?