McEliece cryptosystem: simulation and security vulnerabilities