Difference between Cryptography and Cryptanalysis

Key Difference:  Cryptography is the art of hiding messages by converting them into hidden texts. It is generally done in order to transmit a message over insecure channels. On the other hand, cryptanalysis is the art of decrypting or obtaining plain text from hidden messages over an insecure channel. It is also known as code cracking.

Cryptography works as an asset when it comes to hide information especially over an insecure channel. Today, most of the messages are communicated over net – like bank interactions and email communication. Therefore, it becomes the necessity of time to use the technique of hiding messages.

Cryptography converts a plaintext (message to be communicated) to a cipher text message by employing techniques of encryption. The process of obtaining a cipher text from a plaintext is referred to as decryption. This art of cryptography is an ancient art and the first documented use of this term in writing dates back to circa 1900 B.C.  Generally, there are three different cryptographic schemes which are used widely –

  • Secret key or Symmetric Cryptography – it uses same key for encryption and decryption
  • Public-key or Asymmetric Cryptography, and – it uses one key for encryption and another for decryption
  • Hash functions – it makes use of a mathematical transformation to encrypt the information in an irreversible manner.

Cryptanalysis is the art which is associated with decryption of a cipher text into plain text. An unauthorized person tries to decrypt the message by eavesdropping into the insecure channel. It is also known as code breaking. This person is not bounded by any of the rules. He may use any of the methods in order to get the plain text. In this case, the person is now aware with the proper keys, and thus uses one or many of the cryptanalytic techniques. Some of the techniques are

  • Ciphertext-only attack – In this case, the attacker has only the cipher text to reach plaintext, and thus he makes guess about the plaintext.
  • Known-plaintext attack – In this case, the attacker tries to guess the plaintext by analyzing some part of the cipher text.
  • Chosen-plaintext attack – the cryptanalyst can choose plaintexts and obtain their corresponding cipher texts. The aim is to choose the plaintexts such that the resulting pairs of plaintext and cipher texts makes easy for deducing the encryption key.
  • Man in the middle attack – the person will intercept the signals sent by sender and receiver. He will pose to them as the other party and will exchange keys with both of them separately.

Classical ciphers are decoded by cryptanalysts by using methods like index of coincidence, Kasiski examination and frequency analysis. Modern attackers started with the attacks on the block cipher standard DES by using Differential and Linear attack in the 90s.

Therefore, cryptography and cryptanalysis are two different processes. In cryptography, a message is coded so that it becomes unreadable for people who can misuse the information. On the other hand, cryptanalysis is done by an intruder in ordered to decode the message.

Comparison between Cryptography and Cryptanalysis:

                                           

Cryptography

Cryptanalysis

Defintion

The art or science of encrypting plain messages into cipher text for security of the messages especially while transmission.

The art of obtaining plain text from a cipher text without knowledge of key.

Origin

From Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively

From Greek kryptós, "hidden", and analýein, "to loosen" or "to untie"

Practitioner

Cryptographer

Cryptanalyst

Focus

Secret writing

Breaking secrets

Concern for cipher or hash

  • Obtaining an original or completely new hash.
  • Efficient Hash or cipher
  • Hash or cypher needs to be more conservative and therefore slower
  • Less original

Characteristics

  • It uses operations like substitution, transposition and product systems
  • The system may use same key or different keys for sender and receiver
  • Processing techniques include block cipher and stream cipher
  • Depends on the nature of the algorithm and mostly at some knowledge of the characteristics of plaintext
  • It attempts to find out the ciphertext or the key

Image Courtesy: commons.wikimedia.org, sumuri.com

Most Searched in Business and Finance Most Searched in Society and Culture
Most Searched in Computers and Internets Most Searched Non-Alcoholic Drinks
Molarity vs Molality
Sony Xperia SP vs HTC One
High Blood Pressure vs Low Blood Pressure
Rosewood vs Ebony

Comments

M gona refer this post for my engineering viva exams...grt post...if possible , plzz share more info on IT security..

Add new comment

Plain text

CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.