Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » C »

cryptanalysis

The study of a cryptographic system for the purpose of finding weaknesses in the system and breaking the code used to encrypt the data without knowing the code��s key. There are 4 basic steps in a typical cryptanalysis:
  1. Determine the language being used
  2. Determine the system being used �� this can be a time-consuming stage in the process and involves counting character frequency, searching for repeated patterns and performing statistical tests.
  3. Reconstruct the system��s specific keys
  4. Reconstruction of the plain text �� this step typically takes place at the same time as the keys are reconstructed.
Cryptanalysis often is used by governments in military and diplomatic surveillance, by enterprises in testing the strength of security procedures, and by malicious hackers in exploiting weaknesses in Web sites.






TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
What You Don't Read Can Hurt You

Does this sound familiar? An online service promises to help your small business cut costs, increase productivity, make your coffee and walk your... Read More »

Who's Moving Ahead in Cloud Computing?

The future remains, well, cloudy. But either way: Amazon, look out. Microsoft is gaining fast. Read More »

We Can't Give Up on Privacy!

Even new and emerging technologies that can make our lives easier, safer and healthier can jeopardize our privacy. Read More »

QUICK REFERENCE
Webopedia Polls

The trend for the past two years has been for shoppers to spend more online during the holiday season. How do you typically shop for holiday... Read More »

How to Create a Desktop Shortcut to a Website

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Read More »

Flash Data Storage Vendor Trends

Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »