1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
11 | 12 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
13 | 5 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
2. A method of encrypting alphabetic text using a series of different Caesar ciphers based on the letters of a keyword.
3. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext
4. A technique used in cryptanalysis to analyze the frequency of letters or symbols in a ciphertext
5. The number of places by which each letter in the plaintext is shifted in the Caesar Cipher.
6. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.
7. The process of analyzing encrypted information to decipher the original message or data.
8. A cipher that uses multiple alphabets to encrypt a message.
9. A type of encryption where each letter in the plaintext is replaced by a different letter or symbol
10. Communication that is encrypted and protected from unauthorized access
11. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
12. A mathematical operation that finds the remainder when one integer is divided by another. The Vigenere Cipher uses this operator to perform its encryption and decryption operations.
13. A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords.
14. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
15. A measure of the effectiveness of a password in resisting unauthorized access.