You are the system administrator for a Company that wishes to monitor the encrypted communications between your employee's web-browser and the servers. Knowing that PKI is used to establish the session keys, is it possible to mount a man-in-the-middle attack? If so how? If not why
What are some fundamental assumptions that makes PKI work