Pigpen Cypher | Cipher |
Symbol | Substitution Cipher |
Cryptography | Encryption |
Decryption | Algorithm |
A method of encoding information so that it can only be accessed by authorized parties. | Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes. |
A cipher that replaces each letter in the plaintext with a different letter, symbol, or number in the ciphertext. | A graphical representation used to represent something else, such as a letter or number in a cipher. |
The process of converting plaintext into ciphertext using a cryptographic algorithm and a key. | The practice of securing communication from unauthorized access. |
A sequence of steps or instructions used to solve a problem or perform a task. | The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key. |
Plaintext | Ciphertext |
Key | Symbol Set |
Repetition | Monoalphabetic Cipher |
Polyalphabetic Cipher | Key Length |
The encrypted message or data that is the result of an encryption process. | The original message or data that is to be encrypted. |
The set of symbols used in a cipher to represent plaintext letters. | A secret value used to encrypt or decrypt information. |
A substitution cipher in which each letter is replaced with a single, fixed symbol throughout the ciphertext. | The practice of using the same key repeatedly in a cipher. |
The length of the key used in a cipher, typically measured in bits. | A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext. |
Cryptanalysis | |
The process of analyzing encrypted information to decipher the original message or data. | |