Problem
At one point, Bob tried using a file transfer software program to get his survey files to his work server, and this program included file encryption using a stream cipher based on a one way hash function. All of Bob's survey files follow the same format and contain similar kinds of data
Briefly explain one way an attacker could exploit Bob's program to target his survey files.