The document discusses two cryptographic problems involving Alice and Bob's communication methods and the Kalns cryptosystem. It presents Bob's encryption method that fails the indistinguishability under chosen ciphertext attack (ind-cca) definition, and offers a detailed analysis of the Kalns system, including its structure and vulnerabilities to chosen ciphertext attacks. The document includes technical explanations and the successful implementation of an attack against the Kalns system to retrieve the encryption keys.