An attack on a computer system whereby the key used for the encryption of messages is discovered by an intruder. Normally the intruder sends a number of messages which differ only slightly; for example, by transposing a small number of adjacent letters and examining the encrypted text that has been produced by the computer system.