Group 1: Leo Choi, David St Louis, Nina Undug, Janelle Wiebe & Jamie Wong Many business operations employ public-key cryptography to uphold client privacy rights during the transportation of sensitive data. In public-key cryptography, messages are encrypted using the receiver’s public key, which is publicly available. Consider the following man-in-the-middle attack that may result from …