Also found in: Thesaurus, Encyclopedia, Wikipedia.


1. The analysis and deciphering of cryptographic writings or systems.
2. also crypt·an·a·lyt·ics (krĭp′tăn-ə-lĭt′ĭks)(used with a sing. verb) The study of techniques for deciphering cryptographic writings or systems.

crypt·an′a·lyst (krĭp-tăn′ə-lĭst) n.
crypt·an′a·lyt′ic (-lĭt′ĭk) adj.
crypt·an′a·lyze′ (-ə-līz′) adj.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Adj.1.cryptanalytic - of or relating to cryptanalysis
References in periodicals archive ?
On the disadvantage for the designers, the cryptanalytic process has also been substantial.
Identity-based encoding could be a promising cryptanalytic primitive to create a sensible information sharing system.
Colonel Sinkov ended the war as the Chief Cryptanalytic Officer for U.
This upgrade provides all parties with the means to resist cryptanalytic attacks directed at a weakening SHA-1 standard.
Wiener, "Parallel collision search with cryptanalytic applications," Journal of Cryptology, vol.
But it turns out that only a few primes are commonly used, putting the price well within the NSA's $11 billion-per-year budget dedicated to "groundbreaking cryptanalytic capabilities.
Alan Turing made a crucial contribution to the cryptanalytic success of GCHQ's forerunner, the Government Code and Cypher School, at Bletchley Park during World War II.
The EU and governments around the world are investing heavily in building quantum computers; society needs to be prepared for the consequences, including cryptanalytic attacks accelerated by these computers.
Oechslin, "Making a Faster Cryptanalytic Time-Memory Trade-Off", Advances in Cryptology-CRYPTO 2003, Springer Berlin Heidelberg, pp.
Examples include tools to help gain initial access onto a target (exploit kits), along with the payloads (malware) and the parts and features of those payloads, services to help scale or deliver a payload, support products to ensure that infrastructure is set up correctly or to provide cryptanalytic services, as well as considerations for how to manage the stolen goods.
Matthaus, Arno & Torben (2010) describe the development of a set of tools which allows for running large cryptanalytic jobs on a peer-to-peer (P2P) system.
We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,'' the director of national intelligence, James R.