1 | 12 | |||||||||||||||||||||||
2 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | 11 | |||||||||||||||||||||||
8 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
1. A technique used in cryptanalysis to analyze the frequency of letters or symbols in a ciphertext
2. A measure of the effectiveness of a password in resisting unauthorized access.
3. The encrypted form of a plaintext message
4. The study of analyzing and breaking encryption schemes
5. A type of encryption where the order of letters in the plaintext is rearranged
6. The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form.
7. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.
8. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext
9. A security feature that locks a user's account after a specified number of failed authentication attempts.
10. A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords.
11. A method used in cryptography to try all possible combinations until the correct one is found
12. A type of encryption where each letter in the plaintext is replaced by a different letter or symbol