- When content of message change after sending the message by sender but before receiver receive it then we can say that integrity of message is lost.
- For example if user A sent message to user B but somehow user C managed to access that message and change content of message. User B have no way to knowing that message is tampered after user A sent that message. User A also does not know that message is tampered.
- This type of attacks is known as modification.
