1: \begin{abstract}
2: This paper shows that an eavesdropper can always recover precisely the private key
3: of one of the two parts of the public key cryptography protocol introduced by Shpilrain
4: and Ushakov in \cite{su}. Thus an eavesdropper can always recover the shared secret key
5: making the protocol insecure. \\
6: \textsl{2000 Mathematics Subject Classification:} 68P25, 94A60, 20F10, 37E05 \\
7: \emph{Key words and phrases:} Decomposition Problem; Conjugacy Problem;
8: Infinite Groups; Normal Form; Piecewise-Linear Homeomorphism;
9: \end{abstract}
10: