Attackers are recording, and sometimes forging, vast volumes of human communication. Some of this communication is protected by cryptographic systems such as the Rivest–Shamir–Adleman (RSA) system and ...