A limited time attack wherein an attacker has full access to a system for a limited time. Can hve:

  • Limited number of plaintext-ciphertext pairs