Security.com

cryptanalysis

By TechTarget Contributor

What is cryptanalysis?

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems to understand how they work and to find and improve techniques for defeating or weakening them. For example, cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source, encryption key or the algorithm used to encrypt it. Cryptanalysts also target secure hashing, digital signatures and other cryptographic algorithms.

How does cryptanalysis work?

While the objective of cryptanalysis is to find weaknesses in or otherwise defeat cryptographic algorithms, cryptanalysts' research results are used by cryptographers to improve and strengthen or replace flawed algorithms. Both cryptanalysis, which focuses on deciphering encrypted data, and cryptography, which focuses on creating and improving encryption ciphers and other algorithms, are aspects of cryptology, the mathematical study of codes, ciphers and related algorithms.

Cryptanalysts might discover methods of attack that completely break an encryption algorithm, which means that ciphertext encrypted with that algorithm can be decrypted trivially without access to the encryption key. More often, cryptanalytic results uncover weaknesses in the design or implementation of the algorithm, which can reduce the number of keys that need to be tried on the target ciphertext.

For example, a cipher with a 128-bit encryption key can have 2128 (or 340,282,366,920,938,463,463,374,607,431,768,211,456) unique keys. On average, a brute-force attack against that cipher will succeed only after trying half of those unique keys. If cryptanalysis of the cipher reveals an attack that can reduce the number of trials needed to 240 (or just 1,099,511,627,776) different keys, then the algorithm has been weakened significantly, to the point that a brute-force attack would be practical with commercial off-the-shelf systems.

Who uses cryptanalysis?

Cryptanalysis is practiced by a broad range of organizations and individuals, including the following:

The constant battle between cryptographers trying to secure information and cryptanalysts trying to break cryptosystems moves the entire body of cryptology knowledge forward.

Cryptanalysis techniques and attacks

There are many different types of cryptanalysis attacks and techniques, which vary depending on how much information the analyst has about the ciphertext being analyzed. Cryptanalytic methods include the following:

Other types of cryptanalytic attacks include techniques for convincing individuals to reveal their passwords or encryption keys, developing Trojan horse programs that steal secret keys from victims' computers and send them back to the cryptanalyst, or tricking a victim into using a weakened cryptosystem.

Side-channel attacks have also been known as timing or differential power analysis. These attacks came to wide notice in the late 1990s when cryptographer Paul Kocher was publishing results of his research into timing attacks and differential power analysis attacks on Diffie-Hellman, Rivest-Shamir-Adleman, Digital Signature Standard and other cryptosystems, especially against implementations on smart cards.

Cryptanalysis tools

Because cryptanalysis is primarily a mathematical subject, the tools for doing cryptanalysis are in many cases described in academic research papers. There are many tools and other resources available for those interested in learning more about doing cryptanalysis, including the following:

Cryptanalysts also commonly use many other data security tools, including network sniffers and password cracking software. Cryptanalytic researchers also often create their own custom tools for specific tasks and challenges.

Requirements and responsibilities for cryptanalysts

A cryptanalyst's duties might include developing algorithms, ciphers and security systems to encrypt sensitive information and data, as well as analyzing and decrypting different types of hidden information, including encrypted data, cipher texts and telecommunications protocols, in cryptographic security systems.

Government agencies and private sector companies hire cryptanalysts to ensure their networks are secure and sensitive data transmitted through their computer networks is encrypted.

Cryptanalysts might also be responsible for the following duties:

Individuals planning to pursue a career in cryptanalysis are advised to obtain a bachelor's degree in computer science, computer engineering, mathematics or a related field. Some organizations consider hiring individuals without a technical degree if they have extensive training and prior work experience in the field.

A Master of Science degree is strongly recommended unless the candidate has a bachelor's degree in mathematics and computer science. The strongest candidates have a doctoral degree in mathematics or computer science with a focus on cryptography.

Editor's note: TechTarget editors revised this definition in 2024 to improve the reader experience.

10 Apr 2024

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement