1 | 14 | ||||||||||||||||||||||
16 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||
3 | |||||||||||||||||||||||
15 | |||||||||||||||||||||||
4 | |||||||||||||||||||||||
17 | |||||||||||||||||||||||
11 | |||||||||||||||||||||||
5 | 13 | ||||||||||||||||||||||
12 | 6 | ||||||||||||||||||||||
7 | |||||||||||||||||||||||
8 | |||||||||||||||||||||||
9 | |||||||||||||||||||||||
10 | |||||||||||||||||||||||
1. A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns
2. The process of converting ciphertext into plaintext using a cipher
3. A set of rules or steps that describe how to solve a problem or perform a task
4. A cipher that rearranges the order of the plaintext without changing the actual letters or characters
5. The process of converting plaintext into ciphertext using a cipher
6. A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns.
7. The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher
8. The size or length of the key used by a cipher
9. The encrypted message produced by applying a cipher to plaintext
10. Communication that is encrypted and protected from unauthorized access
11. The total number of possible keys that can be used by a cipher
12. The original message before being encrypted by a cipher
13. The horizontal lines of the zigzag pattern used to write the plaintext for the Rail Fence Cipher
14. The practice of analyzing and breaking codes and ciphers
15. A pattern that moves in a back-and-forth motion like a zigzag
16. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
17. A cryptanalysis technique that involves trying every possible key to break a cipher