The attacker is able to generate the corresponding ciphertext to deliberately chosen plaintext. Essentially, the attacker can feed information into the encryption system and observe the output. The attacker may not know the algorithm or the secret key in use.
Announcement
Collapse
No announcement yet.
Chosen Plaintext Attack
Collapse