Which of the following cryptography attack methods is usually performed without the use of a computer?