The attacker possesses the plaintext and the ciphertext of one or more messages. The attacker will then use this acquired information to determine the key in use. This attack shares may similarities with brute-force attacks.
Announcement
Collapse
No announcement yet.
Known Plaintext Attack
Collapse