Cryptography Reference
In-Depth Information
(3
,
15)
,
(19
,
14)
,
(6
,
15)
,
(1
,
24)
,
(22
,
13)
,
(4
,
7)
,
(13
,
24)
,
(3
,
21)
,
(18
,
12)
,
(26
,
5)
,
(7
,
12)
Decrypt the message without computing Bob's private key. Just look at the ci-
phertext and use the fact that there are only very few masking keys and a bit of
guesswork.