Source: https://mpsimmac.files.wordpress.com/2012/04/cryptographie-partie-2.pdf