1 | 11 | 12 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
4 | 10 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. The study of analyzing and breaking encryption schemes
2. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
3. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
4. The practice of securing communication from unauthorized access.
5. A polyalphabetic cipher that uses a keyword consisting of a repeating pattern of letters to encrypt a message.
6. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
7. A polygraphic substitution cipher that uses a 5x5 table containing a keyword or phrase to encrypt pairs of plaintext letters.
8. "A polyalphabetic cipher similar to the Vigenere Cipher, but using the plaintext itself as part of the key sequence in order to overcome a weakness observed in the original Vigenere Cipher."
9. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext
10. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.
11. The practice of using the same key repeatedly in a cipher.
12. A security feature that locks a user's account after a specified number of failed authentication attempts.
13. The process of converting plaintext into ciphertext in order to protect data
14. The length of the key used in a cipher, typically measured in bits.
15. The set of symbols used in a cipher to represent plaintext letters.
16. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
17. A technique used to analyze and decipher encrypted messages by studying the frequency of occurrence of letters or symbols in the ciphertext.