An encryption algorithm can have weaknesses that could allow an attacker to listen in. Two years ago, researchers in the […]