As a result, in addition to compromising confidentiality, an active attack can also compromise the integrity and authenticity of messages sent and received by Alice and Bob. In practice, message integrity and authenticity are often more important than confidentiality because integrity and authenticity are required for safe operation of any cyber-physical system, whereas confidentiality is not. So, active attacks are not only more powerful but are often more dangerous than passive attacks.