1/10 | 12 | 16 | |||||||||||||||||||||
15 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||
11 | 3 | ||||||||||||||||||||||
14 | |||||||||||||||||||||||
9 | 4 | ||||||||||||||||||||||
5 | |||||||||||||||||||||||
13 | |||||||||||||||||||||||
6 | |||||||||||||||||||||||
7 | |||||||||||||||||||||||
8 |
1. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
2. The length of the key used in a cipher, typically measured in bits.
3. The set of symbols used in a cipher to represent plaintext letters.
4. A sequence of steps or instructions used to solve a problem or perform a task.
5. A method of encoding information so that it can only be accessed by authorized parties.
6. The encrypted message or data that is the result of an encryption process.
7. The practice of securing communication from unauthorized access.
8. The process of analyzing encrypted information to decipher the original message or data.
9. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
10. The original message or data that is to be encrypted.
11. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
12. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
13. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
14. A graphical representation used to represent something else, such as a letter or number in a cipher.
15. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
16. The practice of using the same key repeatedly in a cipher.