Step-by-step explanation:
Let's say that Alice's public key is (Ea,Na) and Bob's public key is (Eb,Nb) and registered. For Eve to change the file she could go ahead and create two new keys (Eza, Nza) and (Ezb, Nzb) then she could go on to register these for both Alice and Bob. If she is able to intercept their private conversations, she would be able to undo computation and change it to an encryption that has her own key.