A Attack Models where the attack has access to: Ciphertext encrypted from plaintext using unknown keys Unknown keys related mathematically to target key Last N bits of key are identical