figure3

figure3

Figure 3: Encrypted payload (left) compared to decrypted payload (right)