Due on Wednesday, November 17 by 11:59pm
Write a technical paper review, and in your discussion, please address the following question.
- At the end of the paper, Blaze states that an important property maintained by a good cryptosystem is that it prevents an attacker from testing the value of any single bit of a key independently. What is the relation between that property and the attack described here? Take a few minutes and see if you can think of (or find on the Internet) an example of such an attack against a software cryptosystem. Describe that attack.
Turn-in instructions: commit your response to your reading responses Github repository. Please use the LaTeX template supplied in your repository. Be sure to turn in both your source
.tex file and a compiled