While cryptography does teach us that some methods are weak against such attacks, but since they are using asymmetric crypto, that means each of my messages would be encypted with the RECIPIENT's public key. thus you really dont know WHICH messages are encrypted with teh same key. thus you can't apply such an attack.
PS: i think asymmetric crypto is secure from such attacks anyways, though isn't that way slower than symmetric crypto?
PS: i think asymmetric crypto is secure from such attacks anyways, though isn't that way slower than symmetric crypto?