Answer:
On the server, Eve could create and register her own version of Bob's and Alice's pairs of keys, then she can intercept the communication between Bob and Alice, decrypt the message and recalculate the hash, and also re-encrypting it all with her own version of Bob's and Alice's private and public keys.
Explanation:
Cryptography is the study of various methods to secure communication between two parties in the presence of a third known as adversaries.
Messages sent through communication mediums are encrypted to protect the confidentiality and integrity of their content. Using secure pins known as keys are used in some type of cryptography to encrypt and decrypt messages.
These keys are protected from adversaries and should be secured in servers.