1/11 | 12 | ||||||||||||||||||||||||
2/3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A polygraphic substitution cipher that uses a 5x5 table containing a keyword or phrase to encrypt pairs of plaintext letters.
2. A cryptanalytic technique that involves trying every possible key until the correct one is found. This is usually only feasible for small key sizes.
3. An attack on a cipher by trying every possible key until the correct one is found.
4. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
5. A cipher that uses multiple alphabets to encrypt a message.
6. A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords.
7. The study of analyzing and breaking encryption schemes
8. The number of places by which each letter in the plaintext is shifted in the Caesar Cipher.
9. A security feature that locks a user's account after a specified number of failed authentication attempts.
10. The practice of securing communication from unauthorized access.
11. A measure of the effectiveness of a password in resisting unauthorized access.
12. The study of the frequency and distribution of letters or symbols in a text to help break a cipher.
13. A pattern that moves in a back-and-forth motion like a zigzag
14. A polyalphabetic cipher that uses a keyword consisting of a repeating pattern of letters to encrypt a message.