Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cryptanalysis
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Study of analyzing information systems in order to discover their hidden aspects}} [[File:Cyklometr.jpg|thumb|upright=1.5|Reconstruction of the appearance of [[cyclometer]], a device used to break the encryption of the [[Enigma machine]]. Based on sketches in [[Marian Rejewski]]'s memoirs.]] '''Cryptanalysis''' (from the [[Greek language|Greek]] ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing [[information system]]s in order to understand hidden aspects of the systems.<ref>{{cite web|url=http://www.nsa.gov/careers/career_fields/cryptsiganalysis.shtml |title=Cryptanalysis/Signals Analysis |publisher=Nsa.gov |date=2009-01-15 |access-date=2013-04-15}}</ref> Cryptanalysis is used to breach [[Cryptography|cryptographic]] security systems and gain access to the contents of [[Encryption|encrypted]] messages, even if the [[key (cryptography)|cryptographic key]] is unknown. In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of [[side-channel attacks]] that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation. Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British [[Bombe]]s and [[Colossus computer]]s at [[Bletchley Park]] in [[World War II]], to the [[Mathematics|mathematically]] advanced computerized schemes of the present. Methods for breaking modern [[cryptosystem]]s often involve solving carefully constructed problems in [[pure mathematics]], the best-known being [[integer factorization]].
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)