Cryptanalysis is the art of attacking cryptographic systems to recover plaintext, discover keys, or forge authenticated messages without authorised access to the key. The CISSP exam tests cryptanalytic attacks at two levels: classic attacks against the mathematical properties of cryptographic algorithms, and implementation attacks that exploit how cryptography is deployed rather than the algorithm itself. Understanding this distinction is critical — the exam explicitly tests it.

Classic Cryptanalytic Attacks

Classic attacks are theoretical attacks against the mathematical structure of cryptographic algorithms. The attacker has access to some combination of ciphertext, plaintext, or the ability to interact with an encryption oracle.

Brute force attack (exhaustive key search) involves systematically trying every possible key until the correct one is found. The feasibility of a brute force attack depends entirely on key length. A 56-bit DES key can be bruted in hours with modern hardware. A 128-bit AES key has 2^128 possible values — far beyond the computational capacity of any foreseeable classical computer. Quantum computers running Grover's algorithm reduce the effective security of symmetric keys by half, making 256-bit keys the recommendation for quantum resistance.

Ciphertext-only attack: the attacker has only ciphertext and must work from it alone. This is the most limited attack scenario. Historical ciphers (Caesar cipher, Vigenère) were vulnerable to ciphertext-only attacks through frequency analysis. Modern algorithms are designed to be secure even under ciphertext-only conditions.

Known-plaintext attack: the attacker has one or more pairs of plaintext and the corresponding ciphertext. This gives the attacker more information to work with when trying to derive the key. WEP (the deprecated Wi-Fi encryption standard) was vulnerable to known-plaintext attacks.

Chosen-plaintext attack: the attacker can choose arbitrary plaintexts and observe the resulting ciphertexts. This is a more powerful attack because the attacker can probe the algorithm with specific inputs to gain information about the key. Some modes of operation for block ciphers (ECB mode in particular) are vulnerable to chosen-plaintext attacks.