I have a question about decryption.
Let's say I have a bunch of files that are encrypted. Someone gains access to those files, and finds out that he already has one of them, unencrypted.
My question is, can he use that file to make a comparison with the encrypted version of the file to find the key, therefor be able to decrypt all the files?