The careful use of [cipher block chaining]-mode encryption prevents information … [e.g., length of common prefixes], but significant channels for information leakage still remain. These are … can be decoded by a wiretapping accomplice. The … transmission, and their destination.
Google-1
Google-2
Copyright clearance needed for quotation.