Cryptography is a complex and mathematically challenging field of study. It involves taking some data or message and obfuscating it so that it is unreadable by parties that the message was not intended. Before the message becomes encrypted it is referred to as the plain text . Once a message becomes encrypted it is then referred to as the cipher text . The study of cipher text in an attempt to restore the message to plaintext is known as cryptanalysis. Differential cryptanalysis and linear cryptanalysis are very important in the field of cryptography. These concepts compose the keystones for most of the attacks in recent years. Also, while designing a cipher, these attacks should be taken into consideration and the cipher should be created as secure against them. Although differential cryptanalysis and linear cryptanalysis are still important, they started to be inefficient due to the improvements in the technology.
Modern cryptographic algorithms like AES or RSA are well-designed and almost infeasible to make a working attack against these algorithms.
"Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on the cryptographic algorithms while ignoring other aspects of security is like defending your house not by building a fence around it, but by putting an immense stake into the ground and hoping that the adversary runs right into it. Smart attackers will just go around the algorithms." - Bruce Schneier.
Our methodology is based on the attack of the sub-layers of cryprographic protocols not the algorithm itself. Random-number generation, key distribution, code implementation are another place where cryptographic systems often break. The cryptography may be strong, but if any sublayer of the security is weak, the system is much easier to break. We conduct a cryptanalysis with our own developed methodology based on NATO and industrial security standards in order to reveal all possible weak links in our client's system.