1/10 | 16 | ||||||||||||||||||||||||
2/13 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
12 | 3 | 17 | |||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5/11 | 15 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A cryptanalysis technique that involves trying every possible key to break a cipher
2. The size or length of the key used by a cipher
3. The practice of analyzing and breaking codes and ciphers
4. The encrypted message produced by applying a cipher to plaintext
5. A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns.
6. The original message before being encrypted by a cipher
7. A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns
8. A cipher that rearranges the order of the plaintext without changing the actual letters or characters
9. A pattern that moves in a back-and-forth motion like a zigzag
10. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
11. The horizontal lines of the zigzag pattern used to write the plaintext for the Rail Fence Cipher
12. The process of converting ciphertext into plaintext using a cipher
13. The total number of possible keys that can be used by a cipher
14. The process of converting plaintext into ciphertext using a cipher
15. The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher
16. A set of rules or steps that describe how to solve a problem or perform a task
17. Communication that is encrypted and protected from unauthorized access