phase3 | WeLiveSecurity

phase3

Figure 5. Phase Three of the decryption process