1 | 13 | ||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
12 | 14 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns
2. The total number of possible keys that can be used by a cipher
3. The size or length of the key used by a cipher
4. The encrypted message produced by applying a cipher to plaintext
5. A cipher that rearranges the order of the plaintext without changing the actual letters or characters
6. A set of rules or steps that describe how to solve a problem or perform a task
7. Communication that is encrypted and protected from unauthorized access
8. The process of converting ciphertext into plaintext using a cipher
9. The original message before being encrypted by a cipher
10. A cryptanalysis technique that involves trying every possible key to break a cipher
11. The process of converting plaintext into ciphertext using a cipher
12. A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns.
13. The practice of analyzing and breaking codes and ciphers
14. A pattern that moves in a back-and-forth motion like a zigzag
15. A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext