Which of the following attacks analyzes large amounts of plaintext/ciphertext pairs created with the same key?