- has two inputs, let's call them DATA and KEY. DATA is a 16-bit value.
- has one output, let's call it ENCRYPTED DATA
- has two inputs, let's call them ENCRYPTED DATA and KEY.
- has one output, let's call it DECRYPTED DATA
- has one input, let's call it ENCRYPTED DATA
-has one output, lets call it DECRYPTED DATA
In short, they test to see how may bits out of the DECRYPTED DATA paths match the DATA path. Each test utilized a new KEY and DATA. Over time, A and B learned how to use the KEY successfully to hide the DATA value from C while B could successfully reproduce DATA at it's DECRYPTED DATA output.
Link to the abstract (.pdf is available for download):