From a cryptoanalysis point of view, there are two means to attack the enemies cryptosystems.

1. break the system through a weakness

2. convince the enemy that you already have broken the system when you can't find a weakness in hopes that they switch to a weaker system you can break.

As far as I am aware, we have absolutely NO information which one of the two applies.