1 | 12 | ||||||||||||||||||||||||
2 | 3/15 | ||||||||||||||||||||||||
4 | 17 | ||||||||||||||||||||||||
14 | 16 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 13 | 18 | |||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
2. A method of encoding information so that it can only be accessed by authorized parties.
3. A type of transposition cipher in which the plaintext is written diagonally on a criss-cross pattern.
4. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
5. A mathematical operation that finds the remainder when one integer is divided by another. The Vigenere Cipher uses this operator to perform its encryption and decryption operations.
6. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
7. A mathematical operator used to perform division with remainder, often denoted by the percent symbol (%).
8. A method of encrypting alphabetic text using a series of different Caesar ciphers based on the letters of a keyword.
9. The length of the key used in a cipher, typically measured in bits.
10. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.
11. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext
12. A security feature that locks a user's account after a specified number of failed authentication attempts.
13. The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher
14. An attack on a cipher by trying every possible key until the correct one is found.
15. The practice of using the same key repeatedly in a cipher.
16. A cipher that uses a single alphabet to encrypt a message.
17. A cipher that uses multiple alphabets to encrypt a message.
18. A sequence of steps or instructions used to solve a problem or perform a task.