Informational constraints in cryptography will tell us the path we will take when we are attacking a certain cipher or ciphertext.