The attacker is able to decrypt a deliberately chosen ciphertext into the corresponding plaintext. Essentially, the attacker can feed information into the decryption system and observe the output. The attacker may not know the algorithm or the secret key in use.
Announcement
Collapse
No announcement yet.
Chosen Ciphertext Attack
Collapse