Pigpen Cypher Cipher
Symbol Substitution Cipher
Cryptography Encryption
Decryption Algorithm

 

A method of encoding information so that it can only be accessed by authorized parties. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext. A graphical representation used to represent something else, such as a letter or number in a cipher.
The process of converting plaintext into ciphertext using a cryptographic algorithm and a key. The practice of securing communication from unauthorized access.
A sequence of steps or instructions used to solve a problem or perform a task. The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.

 

Plaintext Ciphertext
Key Symbol Set
Repetition Monoalphabetic Cipher
Polyalphabetic Cipher Key Length

 

The encrypted message or data that is the result of an encryption process. The original message or data that is to be encrypted.
The set of symbols used in a cipher to represent plaintext letters. A secret value used to encrypt or decrypt information.
A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext. The practice of using the same key repeatedly in a cipher.
The length of the key used in a cipher, typically measured in bits. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.

 

Cryptanalysis Caesar Cipher
Shift Value Alphabet
Modulus Operator Brute-Force Attack
Frequency Analysis Vigenere Cipher

 

A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet. The process of analyzing encrypted information to decipher the original message or data.
A set of letters or symbols in a fixed order used to represent the basic sounds of a language. The number of places by which each letter in the plaintext is shifted in the Caesar Cipher.
An attack on a cipher by trying every possible key until the correct one is found. A mathematical operator used to perform division with remainder, often denoted by the percent symbol (%).
A polyalphabetic cipher that uses a keyword consisting of a repeating pattern of letters to encrypt a message. The study of the frequency and distribution of letters or symbols in a text to help break a cipher.

 

Transposition Cipher Rail Fence Cipher
Modulo Operator Brute Force Attack
Kasiski Examination Autokey Cipher
Playfair Cipher Zigzag Pattern

 

A type of transposition cipher in which the plaintext is written diagonally on a criss-cross pattern. A cipher that rearranges the letters or symbols of a message without changing them.
A cryptanalytic technique that involves trying every possible key until the correct one is found. This is usually only feasible for small key sizes. A mathematical operation that finds the remainder when one integer is divided by another. The Vigenere Cipher uses this operator to perform its encryption and decryption operations.
"A polyalphabetic cipher similar to the Vigenere Cipher, but using the plaintext itself as part of the key sequence in order to overcome a weakness observed in the original Vigenere Cipher." A cryptanalytic technique used to try and discover the length of the keyword used in a Vigenere Cipher by detecting repeating patterns in the ciphertext.
A pattern that moves in a back-and-forth motion like a zigzag A polygraphic substitution cipher that uses a 5x5 table containing a keyword or phrase to encrypt pairs of plaintext letters.

 

Rows Columns
Block Cipher Secure Communication
Key Space Brute Force
Known Plaintext Dictionary Attack

 

The vertical lines of the zigzag pattern used to read off the ciphertext for the Rail Fence Cipher The horizontal lines of the zigzag pattern used to write the plaintext for the Rail Fence Cipher
Communication that is encrypted and protected from unauthorized access A cipher that encrypts a block of plaintext at a time and produces a corresponding block of ciphertext
A method used in cryptography to try all possible combinations until the correct one is found The total number of possible keys that can be used by a cipher
A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext

 

Password Cracking Rainbow Table
Password Strength Two-Factor Authentication
Account Lockout

 

A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password. The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form.
A security mechanism that requires users to provide two different types of evidence before granting access to a system. A measure of the effectiveness of a password in resisting unauthorized access.
A security feature that locks a user's account after a specified number of failed authentication attempts.