An international humanitarian organization uses encrypted me…
An international humanitarian organization uses encrypted messaging apps to communicate sensitive field reports. The developers decide to use RSA encryption for both key exchange and data encryption to simplify the architecture. Several months later, a security audit reveals serious performance issues and susceptibility to chosen ciphertext attacks (CCA) under certain configurations. Which of the following design decisions most likely led to this vulnerability?