Abstract: Encryption techniques have been utilized for a large number of years and, in this way, they are being capable of protecting sensitive data and this has been of incredible intrigue. As the privacy of our secrets have expanded, so have the technological innovations used to secure them. One of the key objectives of the individuals who need to keep confidential data secure is to keep ahead of the techniques used by the attackers. These assaults pose a genuine risk to the security of cryptographic modules. In outcome, cryptographic executions must be assessed for their resistivity against such assaults and the fuse of various countermeasures must be considered. This paper overviews the strategies and methods utilized in these assaults, the damaging impacts of such assaults, the countermeasures against such assaults and assessment of their achievability and materialness.

Keywords: Cryptography, attacks, Differential cryptanalysis, Linear cryptanalysis.