1 | 14 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
10 | 2 | ||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
3/4/13 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext.
2. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
3. A graphical representation used to represent something else, such as a letter or number in a cipher.
4. The set of symbols used in a cipher to represent plaintext letters.
5. The practice of using the same key repeatedly in a cipher.
6. A sequence of steps or instructions used to solve a problem or perform a task.
7. The process of analyzing encrypted information to decipher the original message or data.
8. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.
9. The original message or data that is to be encrypted.
10. The practice of securing communication from unauthorized access.
11. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
12. The encrypted message or data that is the result of an encryption process.
13. A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext.
14. The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.
15. The length of the key used in a cipher, typically measured in bits.