But it's actually demonstrating that the algorithm is secure.
Except, we already know exactly how secure the algorithm is. The breaking of this code will effective yield a single data point on a known statistical distribution of the compute power (or time) required to decrypt the message.