From a scientific theoretical construct, cryptanalysis is nothing more than the study of cryptographic systems in order to find weaknesses in the systems and break their security without the knowledge of secret information, it is important to note that the methods and techniques of cryptanalysis come from cryptoscience.
Fig. 2 The methods and techniques of cryptanalysis are derived from cryptoscience. Image of public domain, Author: Vector_Studio, 2020
Cryptoscience is understood as the scientific segment that studies algorithms, protocols, and each of the systems used to protect valuable information, with the purpose of conferring greater security to the growing flow of communications and exchange of documents and data.
While assigning keys, encrypting (hiding the content of a message from the naked eye), designing codes using mathematical algorithms are an integral part of our lives, and especially for those of us who make use of the web 3.0, it is important to emphasize that these methods were devised by Julius Caesar, military leader, politician and dictator of the last era of the Roman Republic.
According to ethnographic scientific reports, after Julius Caesar reached the peak of power and became the key figure of the Roman Empire, in order to keep secrets for a while, he invented the shift cipher, basically this method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters by other letters of the alphabet.
Fig. 3 The method devised by Julius Caesar was a simple substitution cipher, which consisted of replacing all the letters with other letters of the alphabet. Image of public domain, Author: Hans, 2011
After displacement encryption, an infinite number of encryption methods emerged, including the cryptographic technique of the Spartans, Freemason encryption, among others of lesser or equal relevance up to our sophisticated computational methods and the creation of keys by means of the computer cryptosystem.
BIBLIOGRAPHICAL REFERENCES CONSULTED:
 Onwutalobi A Overview of Cryptography. SSRN Electronic Journal. 2011. Article: Online access
 Chandrasekhar R Cryptography and network security lecture notes. Article: Online access