1 | 15 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 16 | ||||||||||||||||||||||||
7 | 6 | ||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. The encrypted message produced by applying a cipher to plaintext
2. The total number of possible keys that can be used by a cipher
3. The process of converting ciphertext into plaintext using a cipher
4. The process of converting plaintext into ciphertext using a cipher
5. The practice of analyzing and breaking codes and ciphers
6. A set of rules or steps that describe how to solve a problem or perform a task
7. The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher
8. The original message before being encrypted by a cipher
9. A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns
10. A cryptanalysis technique that involves trying every possible key to break a cipher
11. A cipher that rearranges the order of the plaintext without changing the actual letters or characters
12. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
13. A pattern that moves in a back-and-forth motion like a zigzag
14. Communication that is encrypted and protected from unauthorized access
15. The horizontal lines of the zigzag pattern used to write the plaintext for the Rail Fence Cipher
16. A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns.
17. The size or length of the key used by a cipher