With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is...