1 | 17 | |||||||||||||||||||||||
19 | ||||||||||||||||||||||||
2 | ||||||||||||||||||||||||
3/4 | 18 | |||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | ||||||||||||||||||||||||
8 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
16 | ||||||||||||||||||||||||
11/12 | ||||||||||||||||||||||||
13 | ||||||||||||||||||||||||
14 | ||||||||||||||||||||||||
15 | ||||||||||||||||||||||||
1. A sequence of steps or instructions used to solve a problem or perform a task.
2. The study of the frequency and distribution of letters or symbols in a text to help break a cipher.
3. A cipher that uses a single alphabet to encrypt a message.
4. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
5. The set of symbols used in a cipher to represent plaintext letters.
6. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
7. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
8. The practice of securing communication from unauthorized access.
9. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
10. The original message or data that is to be encrypted.
11. A method of encoding information so that it can only be accessed by authorized parties.
12. The encrypted message or data that is the result of an encryption process.
13. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
14. A set of letters or symbols in a fixed order used to represent the basic sounds of a language.
15. An attack on a cipher by trying every possible key until the correct one is found.
16. The number of places by which each letter in the plaintext is shifted in the Caesar Cipher.
17. A cipher that rearranges the letters or symbols of a message without changing them.
18. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
19. The process of analyzing encrypted information to decipher the original message or data.