An attack on a network in which the intruder attempts to discover the key used for encryption. This attack involves the intruder sending known messages to the computer which carries out the encryption and then intercepting the text that is created by the encryption process.