Definition

# cryptanalysis

Contributor(s): Linda Rosencrance, Borys Pawliw

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them. For example, cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source, encryption key or the algorithm used to encrypt it; cryptanalysts also target secure hashing, digital signatures and other cryptographic algorithms.

While the objective of cryptanalysis is to find weaknesses in or otherwise defeat cryptographic algorithms, cryptanalysts' research results are used by cryptographers to improve and strengthen or replace flawed algorithms. Both cryptanalysis, which focuses on deciphering encrypted data, and cryptography, which focuses on creating and improving encryption ciphers and other algorithms, are aspects of cryptology, the mathematical study of codes, ciphers and related algorithms.

Researchers may discover methods of attack that completely break an encryption algorithm, which means that ciphertext encrypted with that algorithm can be decrypted trivially without access to the encryption key. More often, cryptanalytic results uncover weaknesses in the design or implementation of the algorithm, which can reduce the number of keys that need to be tried on the target ciphertext.

For example, a cipher with a 128 bit encryption key can have 2128 (or 340,282,366,920,938,463,463,374,607,431,768,211,456) unique keys; on average, a brute force attack against that cipher will succeed only after trying half of those unique keys. If cryptanalysis of the cipher reveals an attack that can reduce the number of trials needed to 240 (or just 1,099,511,627,776) different keys, then the algorithm has been weakened significantly, to the point that a brute-force attack would be practical with commercial off-the-shelf systems.

Cryptanalysis is practiced by a broad range of organizations, including governments aiming to decipher other nations' confidential communications; companies developing security products that employ cryptanalysts to test their security features; and hackers, crackers, independent researchers and academicians who search for weaknesses in cryptographic protocols and algorithms. It is this constant battle between cryptographers trying to secure information and cryptanalysts trying to break cryptosystems that moves the entire body of cryptology knowledge forward.

### Cryptanalysis techniques and attacks

There are many different types of cryptanalysis attacks and techniques, which vary depending on how much information the analyst has about the ciphertext being analyzed. Some cryptanalytic methods include:

• In a ciphertext-only attack, the attacker only has access to one or more encrypted messages but knows nothing about the plaintext data, the encryption algorithm being used or any data about the cryptographic key being used. This is the type of challenge that intelligence agencies often face when they have intercepted encrypted communications from an opponent.
• In a known plaintext attack, the analyst may have access to some or all of the plaintext of the ciphertext; the analyst's goal in this case is to discover the key used to encrypt the message and decrypt the message. Once the key is discovered, an attacker can decrypt all messages that had been encrypted using that key. Linear cryptanalysis is a type of known plaintext attack that uses a linear approximation to describe how a block cipher Known plaintext attacks depend on the attacker being able to discover or guess some or all of an encrypted message, or even the format of the original plaintext. For example, if the attacker is aware that a particular message is addressed to or about a particular person, that person's name may be a suitable known plaintext.
• In a chosen plaintext attack, the analyst either knows the encryption algorithm or has access to the device used to do the encryption. The analyst can encrypt the chosen plaintext with the targeted algorithm to derive information about the key.
• A differential cryptanalysis attack is a type of chosen plaintext attack on block ciphers that analyzes pairs of plaintexts rather than single plaintexts, so the analyst can determine how the targeted algorithm works when it encounters different types of data.
• Integral cryptanalysis attacks are similar to differential cryptanalysis attacks, but instead of pairs of plaintexts, it uses sets of plaintexts in which part of the plaintext is kept constant but the rest of the plaintext is modified. This attack can be especially useful when applied to block ciphers that are based on substitution-permutation networks.
• A side-channel attack depends on information collected from the physical system being used to encrypt or decrypt. Successful side-channel attacks use data that is neither the ciphertext resulting from the encryption process nor the plaintext to be encrypted, but rather may be related to the amount of time it takes for a system to respond to specific queries, the amount of power consumed by the encrypting system, or electromagnetic radiation emitted by the encrypting system.
• A dictionary attack is a technique typically used against password files and exploits the human tendency to use passwords based on natural words or easily guessed sequences of letters or numbers. The dictionary attack works by encrypting all the words in a dictionary and then checking whether the resulting hash matches an encrypted password stored in the SAM file format or other password file.
• Man-in-the-middle attacks occur when cryptanalysts find ways to insert themselves into the communication channel between two parties who wish to exchange their keys for secure communication via asymmetric or public key infrastructure The attacker then performs a key exchange with each party, with the original parties believing they are exchanging keys with each other. The two parties then end up using keys that are known to the attacker.

Other types of cryptanalytic attacks can include techniques for convincing individuals to reveal their passwords or encryption keys, developing Trojan horse programs that steal secret keys from victims' computers and send them back to the cryptanalyst, or tricking a victim into using a weakened cryptosystem.

Side-channel attacks have also been known as timing or differential power analysis. These attacks came to wide notice in the late 1990s when cryptographer Paul Kocher was publishing results of his research into timing attacks and differential power analysis attacks on Diffie-Hellman, RSA, Digital Signature Standard (DSS) and other cryptosystems, especially against implementations on smart cards.

### Tools for cryptanalysis

Because cryptanalysis is primarily a mathematical subject, the tools for doing cryptanalysis are in many cases described in academic research papers. However, there are many tools and other resources available for those interested in learning more about doing cryptanalysis. Some of them include:

• CrypTool is an open source project that produces e-learning programs and a web portal for learning about cryptanalysis and cryptographic algorithms.
• Cryptol is a domain-specific language originally designed to be used by the National Security Agency specifying cryptographic algorithms. Cryptol is published under an open source license and available for public use. Cryptol makes it possible for users to monitor how algorithms operate in software programs written to specify the algorithms or ciphers. Cryptol can be used to deal with cryptographic routines rather than with entire cryptographic suites.
• CryptoBench is a program that can be used to do cryptanalysis of ciphertext generated with many common algorithms. It can encrypt or decrypt with 29 different symmetric encryption algorithms; encrypt, decrypt, sign and verify with six different public key algorithms; and generate 14 different kinds of cryptrographic hashes as well as two different types of checksum.
• Ganzúa (meaning picklock or skeleton key in Spanish) is an open source cryptanalysis tool used for classical polyalphabetic and monoalphabetic ciphers. Ganzúa lets users define nearly completely arbitrary cipher and plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from non-English text. A Java application, Ganzúa can run on Windows, Mac OS X or Linux.

Cryptanalysts commonly use many other data security tools including network sniffers and password cracking software, though it is not unusual for cryptanalytic researchers to create their own custom tools for specific tasks and challenges.

### Requirements and responsibilities for cryptanalysts

A cryptanalyst's duties may include developing algorithms, ciphers and security systems to encrypt sensitive information and data and analyzing and decrypting different types of hidden information, including encrypted data, cipher texts and telecommunications protocols, in cryptographic security systems.

Government agencies as well as private sector companies hire cryptanalysts to ensure their networks are secure and sensitive data transmitted through their computer networks is encrypted.

Other duties that cryptanalysts may be responsible for include:

• Protecting critical information from being intercepted copied, modified or deleted.
• Evaluating, analyzing and targeting weaknesses in cryptographic security systems and algorithms.
• Designing security systems to prevent vulnerabilities.
• Developing mathematical and statistical models to analyze data and solve security problems.
• Testing computational models for accuracy and reliability.
• Investigating, researching and testing new cryptology theories and applications.
• Searching for weaknesses in communication lines.
• Ensuring financial data is encrypted and accessible only to authorized users.
• Ensuring message transmission data isn't hacked or altered in transit.
• Decoding cryptic messages and coding systems for military, law enforcement and other government agencies.
• Developing new methods to encrypt data as well as new methods to encode messages to conceal sensitive data.

Individuals planning to pursue a career in cryptanalysis are advised to obtain a bachelor's degree in computer science, computer engineering, mathematics or a related field; some organizations will consider hiring individuals without a technical degree if they have extensive training and prior work experience in the field.

A Master of Science degree is also strongly recommended, unless the candidate already has a bachelor's degree in mathematics and computer science. The strongest candidates will have a doctoral degree in mathematics or computer science with a focus on cryptography.

This was last updated in January 2018

## Content

Find more PRO+ content and other member only offers, here.

### 1 comment

Send me notifications when other members comment.
What do you think of the ways cryptanalysis is used today?
Cancel

## SearchCloudSecurity

• ### The security concerns of cloud cryptomining services

Cloud cryptomining as a service is a security risk to users. Expert Frank Siemons discusses cloud mining service providers and ...

• ### How Amazon GuardDuty could bolster enterprise cloud security

The new Amazon GuardDuty aims to secure enterprise AWS accounts and workloads, but does it? Expert Ed Moyle takes a closer look ...

• ### What the Azure AD Connect vulnerability can teach enterprises

Enterprises should learn from a Microsoft Azure AD Connect vulnerability that cloud security requires a hands-on approach. Expert...

## SearchNetworking

• ### Casemore: Cloud, as-a-service honing networking industry trends

Cloud and as-a-service delivery are bringing new urgency to networking. IDC analyst Brad Casemore cites the key networking ...

• ### Now data center interconnect lets traffic ride the cloud

SD-WAN and cloud data center interconnect options are becoming more common as a supplement or replacement for the traditional WAN...

• ### What cloud data center interconnect technologies can do

Data center interconnect technologies and services now use cloud. Learn how CDCI improves traffic delivery and how to choose the ...

## SearchCIO

• ### Cybersecurity skills gap: Get creative about cyber hiring

Hiring candidates from disciplines beyond infosec can go a long way to address the widening cybersecurity skills gap, says ...

• ### How cloud is changing the role of the CIO today

Cloud has had a colossal impact on IT -- for starters, it's changed how it works and what it can pull off. And its effect on the ...

• ### Biometric security technology: Ready for corporate prime time?

Companies are turning to biometric security technology to improve user authentication and experience, but its use presents unique...

## SearchEnterpriseDesktop

• ### Four factors to consider when you migrate to Windows 10

When making the move to Windows 10, there are some important factors for IT to keep in mind, including whether to perform an ...

• ### How to transition to Windows 10 without the headaches

IT pros should take a step back and decide if an upgrade to Windows 10 is right for their organizations, or they may encounter ...

• ### How to take advantage of SCCM and Intune co-management

IT can combine Microsoft Intune and System Center Configuration Manager to manage users' mobile devices, as well as any legacy ...

## SearchCloudComputing

• ### IBM PAIRS Geoscope brings geospatial-temporal data to devs

IBM Research's Geoscope service targets developers who build complex applications that require data from large, disparate ...

• ### IBM cloud tools aim to woo the unconvinced

IBM's latest batch of cloud tools aims to help customers deploy and manage workloads on private and public clouds and keep the ...

• ### Human error still poses a significant cloud security risk

Even with the most sophisticated cloud security tools in play, human error -- both from end users and IT teams -- can open up ...

## ComputerWeekly.com

• ### City & Guilds preps SAP S/4 Hana system migration to Microsoft Azure

Vocational training provider City & Guilds claims moving multiple business applications to a managed Microsoft Azure environment ...

• ### European insurtech growth dwarfs US

Europe is seeing rapid growth in its insurtech as investors pump hundreds of millions into the sector

• ### Cloud key to cyber defence, says Palo Alto Networks

Organisations need to make sense of security intelligence and act on it faster to get ahead of attackers, and cloud-based ...

Close