Introduction to Cryptanalysis – Part 2/2

The following figure summarise the cryptanalysis briefly and its types.

Cryptanalysis Tree Table.png

  • Classical Attacks:
    • Mathematical Analysis.
    • Frequency Analysis.
    • Brute-Force Attack.
  • Implementation Attack: Try to extract key through side channels. For example, the power measurement for a bank smart card.
  • Social Engineering: This attack tricks a user into giving up his/her password.

We will get more details about Social engineering attack and how to prevent them later.


In conclusion, these cryptanalysis techniques are happening regularly in our daily lives. Nothing we can do against the Brute Force attack, since the key space is finite. According to Kerckhoffs’ Principle: “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge”.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s