An attack on texts to which encryption has been applied. In this attack the intruder knows the contents of the plaintexts that gave rise to the ciphertexts and, using this information, attempts to discover the cryptographic key used to encrypt the text. Once the key has been determined, the intruder can decrypt other texts.