SlideShare a Scribd company logo
16
Most read
19
Most read
21
Most read
CRYPTANALYSIS
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding
how they work and finding and improving techniques for defeating or weakening them.
INTRODUCTION
cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source,
encryption key or the algorithm used to encrypt it
GOAL
cryptanalysts' research results are used by cryptographers to improve and strengthen or
replace flawed algorithms
CONT………….
cryptanalytic results uncover weaknesses in the design or implementation of the
algorithm, which can reduce the number of keys that need to be tried on the target
ciphertext
Cryptanalysis 101
Cryptanalysis 101
cryptanalysis is practiced by a broad range of organizations
Including
▣ governments aiming to decipher other nations' confidential
communications
▣ companies developing security products that employ
cryptanalysts to test their security features etc.
Cryptanalysis 101
CRYPTANALY
SIS ATTACKS
Cryptanalysis 101
The attacker only has access to one or more encrypted messages but
knows nothing about the plaintext data
▣ the encryption algorithm being used
▣ any data about the cryptographic key being used
This is the type of challenge that intelligence agencies often face
when they have intercepted encrypted communications from an
opponent
Cryptanalysis 101
The analyst may have access to some
or all of the plaintext of the ciphertext.
The analyst's goal in this case is to
discover the key used to encrypt the
message and decrypt the message.
Once the key is discovered, an
attacker can decrypt all messages that
had been encrypted using that key.
Cryptanalysis 101
chosen
plaintext attack
The analyst either knows the encryption
algorithm or has access to the device used to
do the encryption. The analyst can encrypt the
chosen plaintext with the targeted algorithm to
derive information about the key
Cryptanalysis 101
Dictionary attack
▣ a technique typically used against password files and exploits the human tendency
to use passwords based on natural words or easily guessed sequences of letters or
numbers
Cryptanalysis 101
Man-in-the-middle attacks
▣ occur when cryptanalysts find ways to insert themselves into the communication channel between
two parties who wish to exchange their keys for secure communication via asymmetric or public key
infrastructure The attacker then performs a key exchange with each party, with the original parties
believing they are exchanging keys with each other. The two parties then end up using keys that are
known to the attacker.
Cryptanalysis 101
Brute Force Attack
▣ A brute force attack is any type of attack that involves trying every
possible combination of characters or data in order to find the key in
order to decrypt an encrypted message.
▣ A brute force attack is usually used as a last-resort tactic in a
cryptanalysis scenario, as it very much involves extreme amounts of
trial and error and relies on a lot of luck in order to find the key. A
brute force attack is different from a dictionary attack, as it does not
rely on a dictionary and simply tries every possible key that could be
used.
Cryptanalysis 101
Cryptanalysis 101

More Related Content

PPTX
HTTP & WWW
PPTX
Cryptanalysis
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
PPTX
HTTPS
PPT
HTTP Basics
PPT
Osi , tcp/ip protocol and Addressing
PPTX
Requirements prioritization
HTTP & WWW
Cryptanalysis
Business continuity & disaster recovery planning (BCP & DRP)
HTTPS
HTTP Basics
Osi , tcp/ip protocol and Addressing
Requirements prioritization

What's hot (20)

PDF
Asymmetric Cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPTX
Intro to modern cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography
PPT
Cryptography ppt
PPTX
Cryptography
PDF
2. public key cryptography and RSA
PPT
Classical Encryption Techniques in Network Security
PPTX
Public Key Cryptography
PPTX
RSA Algorithm
PPT
Message authentication and hash function
PPT
6. cryptography
PPTX
Public Key Cryptosystem
PPTX
PPTX
Cryptography
PPT
Symmetric Key Algorithm
PPTX
Cryptography
Asymmetric Cryptography
Cryptography
Introduction to Cryptography
DES (Data Encryption Standard) pressentation
Intro to modern cryptography
Cryptography.ppt
Cryptography
Cryptography ppt
Cryptography
2. public key cryptography and RSA
Classical Encryption Techniques in Network Security
Public Key Cryptography
RSA Algorithm
Message authentication and hash function
6. cryptography
Public Key Cryptosystem
Cryptography
Symmetric Key Algorithm
Cryptography
Ad

Similar to Cryptanalysis 101 (20)

PDF
Types of Cryptosystem and Cryptographic Attack
PPTX
Introduction-to-Chosen-Plaintext-Attacks.pptx
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PDF
Cryptanalysis and Attacks
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PPTX
Information and network security 11 cryptography and cryptanalysis
DOCX
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PPTX
Cryptography introduction and its techniques
PDF
chapter 1-4.pdf
PDF
information technology cryptography Msc chapter 1-4.pdf
PPTX
Cryptography & Network Security.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
Types of Cryptosystem and Cryptographic Attack
Introduction-to-Chosen-Plaintext-Attacks.pptx
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Cryptanalysis and Attacks
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
Information and network security 11 cryptography and cryptanalysis
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
Cryptography introduction and its techniques
chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Cryptography & Network Security.pptx
Cryptography and Network Security-ch1-4.pptx
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Cryptanalysis 101

  • 1. CRYPTANALYSIS Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them.
  • 2. INTRODUCTION cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source, encryption key or the algorithm used to encrypt it
  • 3. GOAL cryptanalysts' research results are used by cryptographers to improve and strengthen or replace flawed algorithms
  • 4. CONT…………. cryptanalytic results uncover weaknesses in the design or implementation of the algorithm, which can reduce the number of keys that need to be tried on the target ciphertext
  • 7. cryptanalysis is practiced by a broad range of organizations Including ▣ governments aiming to decipher other nations' confidential communications ▣ companies developing security products that employ cryptanalysts to test their security features etc.
  • 11. The attacker only has access to one or more encrypted messages but knows nothing about the plaintext data ▣ the encryption algorithm being used ▣ any data about the cryptographic key being used This is the type of challenge that intelligence agencies often face when they have intercepted encrypted communications from an opponent
  • 13. The analyst may have access to some or all of the plaintext of the ciphertext. The analyst's goal in this case is to discover the key used to encrypt the message and decrypt the message. Once the key is discovered, an attacker can decrypt all messages that had been encrypted using that key.
  • 15. chosen plaintext attack The analyst either knows the encryption algorithm or has access to the device used to do the encryption. The analyst can encrypt the chosen plaintext with the targeted algorithm to derive information about the key
  • 17. Dictionary attack ▣ a technique typically used against password files and exploits the human tendency to use passwords based on natural words or easily guessed sequences of letters or numbers
  • 19. Man-in-the-middle attacks ▣ occur when cryptanalysts find ways to insert themselves into the communication channel between two parties who wish to exchange their keys for secure communication via asymmetric or public key infrastructure The attacker then performs a key exchange with each party, with the original parties believing they are exchanging keys with each other. The two parties then end up using keys that are known to the attacker.
  • 21. Brute Force Attack ▣ A brute force attack is any type of attack that involves trying every possible combination of characters or data in order to find the key in order to decrypt an encrypted message. ▣ A brute force attack is usually used as a last-resort tactic in a cryptanalysis scenario, as it very much involves extreme amounts of trial and error and relies on a lot of luck in order to find the key. A brute force attack is different from a dictionary attack, as it does not rely on a dictionary and simply tries every possible key that could be used.