Figure 4:
Intersection attack and solution.