1 | 15 | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | |||||||||||||||||||||
16 | |||||||||||||||||||||
4/5 | |||||||||||||||||||||
6 | |||||||||||||||||||||
7 | 14 | ||||||||||||||||||||
13 | 8 | ||||||||||||||||||||
9 | |||||||||||||||||||||
10 | |||||||||||||||||||||
11 | |||||||||||||||||||||
12 | |||||||||||||||||||||
1. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
2. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
3. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
4. A method of encoding information so that it can only be accessed by authorized parties.
5. The encrypted message or data that is the result of an encryption process.
6. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
7. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
8. The practice of using the same key repeatedly in a cipher.
9. A graphical representation used to represent something else, such as a letter or number in a cipher.
10. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
11. A sequence of steps or instructions used to solve a problem or perform a task.
12. The original message or data that is to be encrypted.
13. The set of symbols used in a cipher to represent plaintext letters.
14. The process of analyzing encrypted information to decipher the original message or data.
15. The practice of securing communication from unauthorized access.
16. The length of the key used in a cipher, typically measured in bits.