Security Analysis Of The Redundancy Identification Attack On Logic Locking