1/10 | 13 | 14 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. The process of analyzing encrypted information to decipher the original message or data.
2. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
3. The original message or data that is to be encrypted.
4. The set of symbols used in a cipher to represent plaintext letters.
5. The practice of using the same key repeatedly in a cipher.
6. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
7. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
8. The practice of securing communication from unauthorized access.
9. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
10. The encrypted message or data that is the result of an encryption process.
11. A sequence of steps or instructions used to solve a problem or perform a task.
12. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
13. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
14. The length of the key used in a cipher, typically measured in bits.