Identify one cryptographic attack and how you can protect against it.