Suppose that an intruder has an encrypted message as well as the decrypted version of that message. What kind of attack would the intruder use to break the encryption scheme used to encrypt the message