Kennabug86981go Kennabug86981go Computers and Technology Answered in what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?