Cryptoanalytic attacks rely on knowing the nature of the underlying algorithm, and some knowledge of the general
characteristics of the plaintext, potentially with some ciphertext / plaintext pairs.
The idea is to use this knowledge to deduce the key which has been used, thus allowing the attacker to gain
access to any message encoded using this key.