Algorithm |
A set of rules or steps that describe how to solve a problem or perform a task |
Block Cipher |
A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext |
Brute Force Attack |
A cryptanalysis technique that involves trying every possible key to break a cipher |
Ciphertext |
The encrypted message produced by applying a cipher to plaintext |
Columns |
The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher |
Cryptanalysis |
The practice of analyzing and breaking codes and ciphers |
Decryption |
The process of converting ciphertext into plaintext using a cipher |
Encryption |
The process of converting plaintext into ciphertext using a cipher |
Frequency Analysis |
A cryptanalysis technique that involves analyzing the frequency of letters or characters in ciphertext to identify patterns |
Key |
A piece of information used by a cipher to encrypt or decrypt plaintext |
Key Length |
The size or length of the key used by a cipher |
Key Space |
The total number of possible keys that can be used by a cipher |
Plaintext |
The original message before being encrypted by a cipher |
Rail Fence Cipher |
A transposition cipher that rearranges plaintext by writing it in a zigzag pattern over a predetermined number of rows before reading off the ciphertext from the columns. |
Rows |
The horizontal lines of the zigzag pattern used to write the plaintext for the Rail Fence Cipher |
Secure Communication |
Communication that is encrypted and protected from unauthorized access |
Transposition Cipher |
A cipher that rearranges the order of the plaintext without changing the actual letters or characters |
Zigzag Pattern |
A pattern that moves in a back-and-forth motion like a zigzag |