Scan QR code or get instant email to install app
Question:
The hacker has both plain-text and cipher-text communications in a known plain-text attack; the plain-text copies are scanned for repeating patterns, which are then compared to the cipher-text versions. This may be used to decipher the key over time and with effort.
Comments