A Attack Models where the attack has access to:

  • Ciphertext encrypted from plaintext using unknown keys
  • Unknown keys related mathematically to target key
    • Last bits of key are identical