Also found in: Thesaurus, Medical, Financial, Acronyms, Encyclopedia, Wikipedia.


1. The analysis and deciphering of cryptographic writings or systems.
2. also crypt·an·a·lyt·ics (krĭp′tăn-ə-lĭt′ĭks)(used with a sing. verb) The study of techniques for deciphering cryptographic writings or systems.

crypt·an′a·lyst (krĭp-tăn′ə-lĭst) n.
crypt·an′a·lyt′ic (-lĭt′ĭk) adj.
crypt·an′a·lyze′ (-ə-līz′) adj.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.


(Communications & Information) the study of codes and ciphers; cryptography
[C20: from cryptograph + analysis]
cryptanalytic, cryptanalytical adj
cryptˈanalyst n
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014


(ˌkrɪp təˈnæl ə sɪs)

1. the procedures, processes, methods, etc., used to translate or interpret secret writings, as codes and ciphers, for which the key is unknown.
2. the science or study of such procedures. Compare cryptography.
[1920–25, Amer.; crypt (ogram) + analysis]
crypt`an•a•lyt′ic (-tæn lˈɪt ɪk) adj.
crypt`an•a•lyt′i•cal•ly, adv.
crypt•an′a•lyst (-ɪst) n.
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.


The steps and operations performed in converting encrypted messages into plain text without initial knowledge of the key employed in the encryption.
Dictionary of Military and Associated Terms. US Department of Defense 2005.


1. the procedures and methods used in translating or interpreting codes and ciphers.
2. the science or study of such procedures. Also cryptanalytics. — cryptanalyst, n. — cryptanalytic, cryptanalytical, adj.
See also: Code
-Ologies & -Isms. Copyright 2008 The Gale Group, Inc. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.cryptanalysis - the science of analyzing and deciphering codes and ciphers and cryptograms
science, scientific discipline - a particular branch of scientific knowledge; "the science of genetics"
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
References in periodicals archive ?
Cryptanalysis is artistry to analyze the information hidden in the ciphertext to retrieve the plain text.
Steinfeld, "Cryptanalysis of RC4 (n, m) Stream Cipher," In Proceedings of the 6th International Conference on Security of Information and Networks, vol.
Unfortunately, several cryptanalysis have proved the existence of security flaws on AES encryption demanding and soliciting the creation of a new space of research [5], [6], [7], [8], [9].
Bagheri [6] proposed a linear cryptanalysis method and results with the reduced-round Simeck block cipher.
The preliminary security analysis [8], conducted during the HIGHT design process, includes the assessment of the cipher with respect to different cryptanalytic attacks such as differential cryptanalysis, related-key attack, saturation attack, and algebraic attack and the designers claim that at least 20 rounds of HIGHT are secure against these attacks.
The obtained results show that the proposed approach is robust and more secure against cryptanalysis attacks without affecting the used bandwidth of the communication channel.
Keller, "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, " Journal of Cryptology, vol.
Taking place from 10-14 April, 2017 at the NH Grand Krasnapolsky in Amsterdam, DarkMatter will use its presence to showcase its latest offerings in the areas of Cryptographic analysis, Cryptanalysis - in particular side channel analysis, systems vulnerabilities research and penetration testing.
The same tool can be used for the both steganography and steganalysis and the cipher text can be decrypted by the cryptanalysis. The spread of the terrorism has been increased through the internet.
"Algebraic Cryptanalysis Scheme of AES-256 Using Grobner Basis" by K.
Furthermore, literature [8] proposed an S-box design approach based on iteration discrete chaotic that had high immunity to the differential cryptanalysis. Using three-dimensional chaotic Baker map, literature [9] constructed an S-box that approximately fulfilled all the criteria for a cryptographically strong S-box.