1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
13 | 16 | ||||||||||||||||||||||||
6 | 5 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
2. The practice of securing communication from unauthorized access.
3. The set of symbols used in a cipher to represent plaintext letters.
4. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
5. A method of encoding information so that it can only be accessed by authorized parties.
6. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
7. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
8. A sequence of steps or instructions used to solve a problem or perform a task.
9. The original message or data that is to be encrypted.
10. The length of the key used in a cipher, typically measured in bits.
11. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
12. The encrypted message or data that is the result of an encryption process.
13. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
14. A graphical representation used to represent something else, such as a letter or number in a cipher.
15. The process of analyzing encrypted information to decipher the original message or data.
16. The practice of using the same key repeatedly in a cipher.