1 | 14 | ||||||||||||||||||||||||
2 | 16 | ||||||||||||||||||||||||
3 | 15 | ||||||||||||||||||||||||
4 | 5 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. The process of converting ciphertext into plaintext using a cipher
2. The size or length of the key used by a cipher
3. A pattern that moves in a back-and-forth motion like a zigzag
4. The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher
5. The total number of possible keys that can be used by a cipher
6. The encrypted message produced by applying a cipher to plaintext
7. A cryptanalysis technique that involves trying every possible key to break a cipher
8. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
9. The original message before being encrypted by a cipher
10. The practice of analyzing and breaking codes and ciphers
11. A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns.
12. The process of converting plaintext into ciphertext using a cipher
13. A set of rules or steps that describe how to solve a problem or perform a task
14. A cipher that rearranges the order of the plaintext without changing the actual letters or characters
15. Communication that is encrypted and protected from unauthorized access
16. A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns