Brute Force | Frequency Analysis |
Known Plaintext | Cryptanalysis |
Ciphertext | Encryption |
Substitution Cipher | Transposition Cipher |
A technique used in cryptanalysis to analyze the frequency of letters or symbols in a ciphertext | A method used in cryptography to try all possible combinations until the correct one is found |
The study of analyzing and breaking encryption schemes | A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext |
The process of converting plaintext into ciphertext in order to protect data | The encrypted form of a plaintext message |
A type of encryption where the order of letters in the plaintext is rearranged | A type of encryption where each letter in the plaintext is replaced by a different letter or symbol |
Dictionary Attack | Password Cracking |
Rainbow Table | Password Strength |
Two-Factor Authentication | Account Lockout |
The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form. | A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords. |
A measure of the effectiveness of a password in resisting unauthorized access. | A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password. |
A security feature that locks a user's account after a specified number of failed authentication attempts. | A security mechanism that requires users to provide two different types of evidence before granting access to a system. |