1. MAN-IN-THE-MIDDLE • Cryptographic Protocol attacks are often analyzed in terms of a man-in-the-middle • This is an agent who is able to listen to…