Abstract
There are two types of methods for evaluating the security of common key block ciphers: brute-force attacks and short-cut methods. For the latter, we investigate the internal structure of the cipher to find a defect and use it for an attack. In this paper, we illustrate the principles of the following typical short-cut methods from 1990 to 2012: differential cryptanalysis, linear cryptanalysis, higher-order differential attack, related-key attack for AES, and biclique attack methods.