answersLogoWhite

0

What is cryptanalysis?

Updated: 12/12/2022
User Avatar

Wiki User

14y ago

Best Answer

Cryptanalysis is the study of taking encrypted data, and trying to unencrypt it without use of the key. The other side of cryptography, cryptanalysis is used to break codes by finding weaknesses within it. In addition to being used by hackers with bad intentions, cryptanalysis is also often used by the military. Cryptanalysis is also appropriately used by designers of encryption systems to find, and subsequently correct, any weaknesses that may exist in the system under design. There are several types of attacks that a cryptanalyst may use to break a code, depending on how much information they have. A ciphertext-only attack is one where the cryptanalyst has a piece of ciphertext (text that has already been encrypted), with no plaintext (unencrypted text). This is probably the most difficult type of cryptanalysis, and calls for a bit of guesswork. In a known-plaintext attack, the cryptanalyst has both a piece of ciphertext and the corresponding piece of plaintext. Other types of attacks may involve trying to derive a key through trickery or theft. The "man-in-the-middle" attack is one example. In this attack, the cryptanalyst places a piece of surveillance software in between two parties that communicate. When the parties' keys are exchanged for secure communication, they exchange their keys with the attacker instead of each other. The ultimate goal of the cryptanalyst however, is to derive the key, so that all ciphertext can be easily deciphered. A brute-force attack is one way of doing so. In this type of attack, the cryptanalyst tries every possible combination until the correct key is identified. Although using longer keys make the derivation less statistically likely to be successful, faster computers, continue to make brute-force attacks feasible. Networking a set of computers together in a grid, combines their strength; their cumulative power can be used to break long keys. The longest keys used, 128-bit keys, remain the strongest, and less likely to be subject to a brute-force attack. At its core, cryptanalysis is a science of mathematics, probability and fast computers; cryptanalyst's also usually require some persistence, intuition, guesswork and some general knowledge of the target. Cryptanalysis also has an interesting historical element; the famous Enigma machine, used by the Germans to send secret messages, was ultimately cracked by members of the Polish resistance and transferred to the British.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is cryptanalysis?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about General History

What are facts about Alan turning?

Alan Turing was a brilliant mathematician, computer pioneer and cryptologist. He was a leading participant in World War II code breaking. He made major discoveries in the field of cryptanalysis . He wrote papers about different approaches to code breaking. After the war, he worked for the National Physical Laboratory. He led the design work for automatic computing engine and created a blueprint for programmable computers. His Turing Test was an attempt to create a standard for intelligent design. He was convicted of homosexuality and sentenced to be chemically castrated. The procedure rendered him impotent. He committed suicide by ingesting cyanide.


What kind of calculation did the first computers perform?

MIT Differential Analyzer (mechanical): solutions of differential equations.Harvard Mark 1 (electromechanical): performed many classified calculations for the US Navy Bureau of Ships during WW2, simulated the implosion mechanism for the Manhattan Project to see if it was practical to detonate an atomic bomb that way.Atanasoff-Berry Computer: solutions of simultaneous equations.Colossus: cryptanalysis of Nazi High Command radio teletype cypher.ENIAC: simulation of Edward Teller's first hydrogen bomb design (proving his design would not work), calculation of firing tables for US Army artillery pieces (its original intended purpose).UNIVAC: correct prediction of 1952 presidential election results, US Census data reduction, business accounting, billing, calculation of insurance company actuarial tables, etc.IBM 701: military, scientific, and engineering calculations.IBM 702: business accounting, billing, calculation of insurance company actuarial tables, etc.etc.Unless identified as (mechanical) or (electromechanical) the computers listed above were electronic.


Achievement of Muslims from 7th to 16th Century in the history?

Islamic achievementin andalusia:better quality of life for Jews (many of Jews migrate to this region in that time, see The Ornament of the World by María Rosa Menocal) the invention of baculus for navigating in sea inventions of musical instruments like: qitara(modern = guitar), rebec (ancestor of violin), exabeba/al-shabbaba (modern = flute), atabal/al-tabl (modern = bass drum), qanun/canon (ancestor of piano) making of anti-earthquake palace al hambra in Spain(ironically when the britons defend themself from vikings only with wooden castle) making of biggest irrigation system in that time invetion of primitive parachute by Abbas Ibn Firnas at 852 first papermills in samarkand and Baghdad. they improved paper making technique from Chinese establish of public library in Baghdad at 900 The earliest known treatises dealing with environmentalism and environmental science, especially pollution, were Arabic treatises written by al-Kindi, al-Razi, Ibn Al-Jazzar, al-Tamimi, al-Masihi, Avicenna, Ali ibn Ridwan, Abd-el-latif, and Ibn al-Nafis. Their works covered a number of subjects related to pollution such as air pollution, water pollution, soil contamination, municipal solid waste mishandling, and environmental impact assessments of certain localities (see L. Gari (2002), "Arabic Treatises on Environmental Pollution up to the End of the Thirteenth Century", Environment and History 8 (4), pp. 475-488) founding of first diploma issuing university on bimaristan founding of first full-fledged university, Al Azhar, Cairo The Iranian born Jabir ibn Hayyan (Geber) introduced the experimental method to chemistry. He established the chemical industry and perfumery industry. For example, the first glass factories in Europe were founded in the 11th century by Egyptian craftsmen in Greece Some of the inventions believed to have come from this time include the camera obscura, coffee, soap bar, tooth paste, shampoo, pure distillation, liquefaction, crystallization, purification, oxidization, evaporation, filtration, distilled alcohol, uric acid, nitric acid, alembic, valve, reciprocating suction piston pump, mechanized waterclocks, quilting, scalpel, bone saw, forceps, surgical catgut, vertical-axle windmill, inoculation, smallpox vaccine, fountain pen, cryptanalysis, frequency analysis, three-course meal, stained glass and quartz glass, Persian carpet, and celestial globe (see Paul Vallely, How Islamic Inventors Changed the World, The Independent, 11 March 2006) and many more...........)


Who is the inventor of the first automatic electric digital computer?

"Who invented the computer and what year?" The answer to the first part of the question is Charles Babbage. Interestingly, the implementation of the design of what should have been the first computer was actually completed in 1989. But, if the question is "Who invented the computer first and electronically?" then it is John Presper Eckert & John W. Mauchly. They built the ENIAC (Electronic Numerical Integrator and Computer). Then why is Charles Babbage given the credit of inventing the computer? Charles Babbage was the first person to introduce the idea of "programmable machines". Charles Babbage hardly imagined that his distaste for human errors would one day result in inventions such as desktop computers and laptop computers.To reach today's era of artificial intelligence, natural language processing and high power processing, computer inventions had to go through various generations. This all started with Charles Babbage's difference engine in 1822. The difference engines and analytical engines (if completed) would be heavily mechanical. Their weight would be in tons (although analytical and difference engine are not considered to be of any generation, let us consider them to be of zeroth generation for the sake of reference). The main feature of first generation (1940 - 1956) computers was vacuum tubes. The architecture of second generation (1956 - 1963) computers was based on transistors. Third generation computers (1964 - 1971) saw the introduction of integrated circuits. And fourth generation (1971 - present) computers are based on microprocessors. And now we are in the fifth generation (present - henceforth) of computers, where artificial intelligence takes precedence. Following is the story of the man who invented the computer, and when he did that, little did the world know that Charles Babbage had managed to alter the course of history .Early YearsCharles' father, Benjamin Babbage, was a businessman. Therefore, money wasn't a hindrance for young Charles' education. Young Charles went to many schools and was home tutored before he went to Helmond Academy in Baker street. This is where his romance with mathematics began. Later he went to Cambridge for further studies. He was subsequently transferred to Peterhouse Cambridge where he studied analytical philosophy and computer science. However, he never really graduated with honors. Charles Babbage was later conferred with an honorary degree in mathematics.Since Charles Babbage was a profound mathematician, he soon started researching on various mathematical subjects. While doing so, he had to encounter a lot of logarithmic calculations. The only way to perform these calculations was through the use of logarithmic tables. Since there were no mechanical calculators in those times, the use of logarithmic tables became very tedious and erroneous. This experience was very hampering to the study of mathematics. Also, the accurate results would take forever to be calculated, hence, Charles decided to design a machine, which not only would save time but (more importantly) be accurate as well.Design of Charles' ComputerIn the early nineteenth century, mathematical tables were calculated by 'computers'. These were people who were assigned the task of computing, and hence were called computers. Due to this, there was a high rate of errors. Having studied computer science and being an acclaimed mathematician, it was obvious to him that he should build a calculating machine. Babbage started working on the design of an engine which would analyze input and give appropriate output.Since his design was meant to eliminate differential errors involving mathematical tables, it was called 'difference engine'. Difference engine was to calculate the finite differences, and thereby avoid the need for multiplication and division. But unfortunately, due to the huge size and the complexity of the design, Charles Babbage couldn't complete it. But this did not deter him from designing difference engine 2, which was an improved version of the original difference engine.After his failure to implement his designs of difference engine, Charles Babbage came to the conclusion that his engine designs needed improvement. He then started to design engines that were better in analysis than their predecessors. The successive designs were more efficient and complex than the previous ones. These complex machines were called analytical engines. Due to continuous work in the design, any one machine couldn't be called an analytical engine. His final design of the analytical engine was implemented only in 1989, which is far more accurate than today's electronic calculator.


How did the Enigma machine work?

A device that looked like a typewriter that the Germans used to create coded messages. They truly believed that the codes were unbreakable but once the allies got their hands on some examples and some code books they got craking on developing machines to decode German transmissions. Let me start with some background. Industrial spying is and was common in the past. Companies are always trying to discover what their competition is doing. In the period before World War II an American invented a machine that would make a code that was "impossible" to break. The machine was unable to get much, if any, interest in the United States. However the German Post Office (before Hitler) bought a few machines. (I do not know what they did with them.) Somehow, and sometime, the German Army found out about them and by the time Hitler was in power they became very popular. The were not common in the early years, but by 1939 there were quite a few of them manufactured in Germany and being used by the German military forces (Army, Navy & Airforce). The machine was given the name "Enigma," meaning a puzzle that cannot be solved. Polish experts had stolen one or two machines before Hitler invaded Poland, and they had some incredably intelligent mathmaticians that were able to break the code. Poland then shared the machine with the French, and later they shared the machine with the British. Owning a machine would not help a person break the code, so while it was nice to see how the machine worked, it was still not enough. Basically the machine is an electric typewriter. BUT when you push the letter "A" it sends and electircal signal to a wheel. Wires inside this wheel will connect it to some other letter, say an "N." But that wasn't the end of it either. That "N" now sends it to another wheel that again changes the letter, and then again to another wheel that again changes the letter. That is not complicated enough. Each of the wheels rotates each time you push the typewriter key. So and "A" with one push might be an "N", but the next push the "A" becomes an "X" and the next push a "T" and so on for 26 or more changes. That is STILL not enough, because there are things in the back of the machine that allows even more changes. So to receive the message someone sends to you a person much know the exact settings of each of the three wheels, and the wiring in the back. Only then can you push the letters you have received and turn them back into the original message sent. Hope this helps. P.S. The British invented the fist computers so they could break the codes, even so it wasn't always easy. == The German Enigma was recovered by American Forces in TICOM (Target Intelligence Commitee [closely related with NSA]). In addition to capturing a few of the machines, they also captured some soldiers familiar with the machine. The soldiers told them the principles behind the machine, and American scientists, engineers, and agents were able to reverse engineer the machine to see how it worked.

Related questions

Is the evaluation of a cryptosystem to test its security?

Cryptanalysis


What Is the evaluation of a cryptosystem to test its security?

Cryptanalysis


What does cryptanalysis mean?

Code-breaking, or solving cryptograms


What are the difference between cryptography cryptanalysis?

The word cryptography means hidden writing, and it refers to the practice of using encryption to conceal text.. And cryptanalysis studies encryption and encrypted messages, hoping to find the hidden meanings.


What are the two general approaches for attacking a Cipher?

Cryptanalysis and Brute Force Attack


What has the author Helen Gaines written?

Helen Gaines has written: 'Cryptanalysis' -- subject(s): Ciphers, Cryptography


What do crytographers create?

They do more than create things such as symetric/asymetric cryptosysystems. They need to be able to perfrom cryptanalysis and analyse cryptograms.


How can I decode a secret message in a PNG?

You will have to know the encryption algorithm and the key used. If you do not know these you will need to use cryptanalysis to "crack" it. This is not easy (obviously).


Compare and contrast cryptography and cryptology?

Cryptology is am umbrella term used for the study of both Cryptography, the study of written communication, and cryptanalysis, the art of studying information systems.


What is the difference between differential and linear cryptanalysis?

The main difference from linear attack is that differential attack involves comparing the XOR of two inputs to the XOR of the corresponding outputs.


What has the author Eli Biham written?

Eli Biham has written: 'Differential cryptanalysis of the data encryption standard' -- subject(s): Access control, Computers, Cryptography, Data encryption (Computer science) 'Fast Software Encryption'


What are other forms of the word cryptic?

Cryptic is an adjective. It is from the Greek word kryptos, meaning hidden.A noun (from the root kryptos, a Greek word) is crypt.Cryptically is the adverb for the adjective cryptic.Crypto- or crypt- is the combining form, as in cryptography or as in cryptanalysis.