Watch this video on YouTube
Identify the attack where the hacker uses the ciphertexts corresponding to a set of plaintexts of his own choosing?