1 | 17 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
18 | 19 | ||||||||||||||||||||||||
5/16 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | 8 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | 13 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
15 |
1. Communication that is encrypted and protected from unauthorized access
2. The encrypted message or data that is the result of an encryption process.
3. A cipher that rearranges the order of the plaintext letters or symbols, rather than replacing them with different ones as in a substitution cipher.
4. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
5. A measure of the effectiveness of a password in resisting unauthorized access.
6. The study of the frequency and distribution of letters or symbols in a text to help break a cipher.
7. A graphical representation used to represent something else, such as a letter or number in a cipher.
8. A method of encrypting alphabetic text using a series of different Caesar ciphers based on the letters of a keyword.
9. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
10. The set of symbols used in a cipher to represent plaintext letters.
11. A sequence of steps or instructions used to solve a problem or perform a task.
12. The total number of possible keys that can be used by a cipher
13. The number of places by which each letter in the plaintext is shifted in the Caesar Cipher.
14. A cipher that uses multiple alphabets to encrypt a message.
15. A pattern that moves in a back-and-forth motion like a zigzag
16. The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form.
17. The process of analyzing encrypted information to decipher the original message or data.
18. A method used in cryptography to try all possible combinations until the correct one is found
19. A cryptanalytic technique used to try and discover the length of the keyword used in a Vigenere Cipher by detecting repeating patterns in the ciphertext.