An algorithm to compromise the data base, rep. 392