Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key. In nontechnical language, this is the practice of codebreaking or cracking the code, although these phrases also have a specialised technical meaning. Cryptanalysis refers to the study of ciphers, cipher text, or cryptosystems with a view to finding weaknesses in them that will permit retrieval of the plaintext from cipher text, without necessarily knowing the key or the algorithm. This is known as breaking the cipher, cipher text or cryptosystem. Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys.
Types of Cryptanalytic Attacks
Cryptanalytic attacks vary in potency and how much of a threat they pose to realworld cryptosystems. A certificational weakness is a theoretical attack that is unlikely to be applicable in any realworld situation; the majority of results found in modern cryptanalytic research are of this type. Essentially, the practical importance of an attack is dependent on the answers to the following four questions:
 What knowledge and capabilities does the attacker need?
 How much additional secret information is deduced?
 How much computation is required? (What is the computational complexity?)
 Does the attack break the full cryptosystem, or only a weakened version?
Usefulness of Cryptanalytic Attack Results
The results of cryptanalysis can also vary in usefulness. Various types of attack on block ciphers according to the amount and quality of secret information that was discovered:
 Total break — the attacker deduces the secret key.
 Global deduction — the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
 Instance (local) deduction — the attacker discovers additional plaintexts (or ciphertexts) not previously known.
 Information deduction — the attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.
 Distinguishing algorithm — the attacker can distinguish the cipher from a random permutation.
Various Types of Cryptanalysis Attacks


Relevant Technical Articles:
 Cryptography Projects for Data Encryption Security : Cryptography is the security practice of Data Encryption for hiding secret information. Encryption is the...
 Message Authentication Codes (MAC) – Cryptography & Data Security : Message Authentication Code (MAC) is one of the Cryptographic Hash Function and is a short...
 3Way Algorithm for Encryption & Decryption – Cryptography & Data Security : Cryptography consists of Block Ciphers. One of such block cipher algorithm is the 3Way Algorithm....
 Encryption Algorithms for Cryptographic Network Security in Data Communications & Storage : Encryption is for information security in digital data communication and storage networks. Encryption programs use...
 ARIA Algorithm for Encryption & Decryption – Cryptography & Data Security : ARIA is a generalpurpose block cipher algorithm developed by Korean cryptographers in 2003.ARIA is an...
 Data Encryption Standard – DES Encryption Algorithm : Data Encryption Standard (DES) or DES Encryption Algorithm is a technique by which a message...
 ABC Algorithm for Encryption & Decryption – Cryptography & Data Security : ABC algorithm, also called Artificial Bee Colony Algorithm was proposed by Karaboga in 2005. Artificial...
 RFID Cryptography Hardware for Data Security : CryptoRF is for 13.56 MHz RFID devices with a 64bit embedded cryptographic engine, dual authentication...
 Cryptography Algorithms for Data Encryption/Decryption and Information Scrambling/Descrambling : Cryptography is the practice and study of hiding secret information by encryption. Encryption is the...
 Bluetooth Wireless Data Security : These days, all communication technology faces the issue of privacy and identity theft, with Bluetooth...