Cryptography Reference
In-Depth Information
(3 , 15) , (19 , 14) , (6 , 15) , (1 , 24) , (22 , 13) , (4 , 7) ,
(13 , 24) , (3 , 21) , (18 , 12) , (26 , 5) , (7 , 12)
Decrypt the message without computing Bob's private key. Just look at the ci-
phertext and use the fact that there are only very few masking keys and a bit of
guesswork.
Search WWH ::




Custom Search