Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the art and science of analyzing information systems in order to study the hidden aspects of the systems. Cryptanalysis is used to defeat cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In addition to mathematical analysis of cryptographic algorithms, cryptanalysis also includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.

Read more about CryptanalysisOverview, History of Cryptanalysis, Cryptanalysis of Symmetric Ciphers, Cryptanalysis of Asymmetric Ciphers, Attacking Cryptographic Hash Systems, Side-channel Attacks, Quantum Computing Applications For Cryptanalysis

Other articles related to "cryptanalysis":

Black-bag Cryptanalysis
... In cryptography, black-bag cryptanalysis is a euphemism for the acquisition of cryptographic secrets via burglary, or the covert installation of keystroke logging or trojan horse software/hardware ... Although sophisticated technology is often used, black bag cryptanalysis can also be as simple as the process of copying a password which someone has unwisely ... Black-bag cryptanalysis is in contrast to a mathematical or technical cryptanalytic attack ...
Quantum Computing Applications For Cryptanalysis
... Quantum computers, which are still in the early phases of research, have potential use in cryptanalysis ... For example, Shor's Algorithm could factor large numbers in polynomial time, in effect breaking some commonly used forms of public-key encryption ...
Partitioning Cryptanalysis
... In cryptography, partitioning cryptanalysis is a form of cryptanalysis for block ciphers ... the attack is a generalization of linear cryptanalysis ... replaced the bit sums (affine transformations) of linear cryptanalysis with more general balanced Boolean functions ...
Truncated Differential Cryptanalysis
... In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers ... Whereas ordinary differential cryptanalysis analyzes the full difference between two texts, the truncated variant considers differences that are only partially determined ...