U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptanalysis

Abbreviation(s) and Synonym(s):

CA

Definition(s):

  Operations performed in defeating cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptanalysis
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptanalysis
NIST SP 800-57 Part 2 [Superseded] under Cryptanalysis

  The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptanalysis
NIST SP 800-57 Part 2 [Superseded] under Cryptanalysis

  1. Operations performed to defeat cryptographic protection without an initial knowledge of the key employed in providing the protection. 2. The study of mathematical techniques for attempting to defeat cryptographic techniques and information-system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Cryptanalysis

  2. The study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself.
Source(s):
CNSSI 4009-2015 [Superseded] from NIST SP 800-57 Part 1 Rev. 3

  1. Operations performed in defeating cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
CNSSI 4009-2015 [Superseded]

  The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptanalysis

  1. Operations performed to defeat cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptanalysis

  2. The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptanalysis