We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Technology

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Cryptanalysis?

By Dan Blacharski
Updated: May 17, 2024
Views: 54,364
Share

Cryptanalysis is the study of taking encrypted data, and trying to unencrypt it without use of the key. The other side of cryptography, it is used to break codes by finding weaknesses within them. In addition to being used by hackers with bad intentions, this discipline is also often used by the military. It is also appropriately used by designers of encryption systems to find, and subsequently correct, any weaknesses that may exist in the system under design.

There are several types of attacks that a cryptanalyst may use to break a code, depending on how much information he or she has. A ciphertext-only attack is one where the analyst has a piece of ciphertext (text that has already been encrypted), with no plaintext (unencrypted text). This is probably the most difficult type of cryptanalysis, and calls for a bit of guesswork. In a known-plaintext attack, the analyst has both a piece of ciphertext and the corresponding piece of plaintext.

Other types of attacks may involve trying to derive a key through trickery or theft, such as in the "man-in-the-middle" attack. In this method, the cryptanalyst places a piece of surveillance software in between two parties that communicate. When the parties' keys are exchanged for secure communication, they exchange their keys with the attacker instead of each other.

The ultimate goal of the cryptanalyst is to derive the key so that all ciphertext can be easily deciphered. A brute-force attack is one way of doing so. In this type of attack, the cryptanalyst tries every possible combination until the correct key is identified. Although using longer keys make the derivation less statistically likely to be successful, faster computers continue to make brute-force attacks feasible. Networking a set of computers together in a grid combines their strength, and their cumulative power can be used to break long keys. The longest keys used, 128-bit keys, remain the strongest, and less likely to be subject to this type of attack.

At its core, cryptanalysis is a science of mathematics, probability, and fast computers. Cryptanalysts also usually require some persistence, intuition, guesswork and some general knowledge of the target. The field also has an interesting historical element; the famous Enigma machine, used by the Germans to send secret messages, was ultimately cracked by members of the Polish resistance and transferred to the British.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
By bagley79 — On Nov 29, 2012

As computers continue to get faster, I think it will be easier instead of more difficult for information to get into the wrong hands. I have had my computer hacked into, and if that ever happens to you, one thing is for sure, you sure take different measures to try and protect your information. I guess I could refuse to use a computer, but don't really know if that would be any better or not.

By julies — On Nov 29, 2012

My nephew is a computer genius. This is something he has been able to do since he was young and his mind just naturally understands how computers work. He can hack into just about any system and that is kind of scary.

The positive side of this is that his ability can be used for good. Companies need people with his ability to offset those hackers who use their skills to steal information from people.

I have no clue how cryptanalysis works. I think the majority of people are like me, and think that just because a website is secure, you are safe. There is a lot that goes on behind the scenes that I don't understand, yet I feel comfortable enough to continue entering personal information online.

By John57 — On Nov 28, 2012

I try to take the proper precautions to prevent hackers from breaking into my computer system. When I think about all the personal information I have stored on my computer, it can make me pretty nervous thinking about someone having access to all that information.

I have read somewhere that some hackers can break into your computer just by following the keystrokes you make on your keyboard. That sounds pretty creepy to me.

Even by changing passwords on a regular basis and making sure I have a firewall, I know it is possible for the right person to get at my information.

By honeybees — On Nov 27, 2012

Although I don't understand much about cryptanalysis, I am somewhat fascinated by it. It amazes me how people who know what they are doing can break a code and get at valuable information that was supposed to be safe. Even though modern cryptanalysis has come along way from where it used to be, the concept is still the same.

Share
https://www.wisegeek.net/what-is-cryptanalysis.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.