Cryptography
Across
- 2. Substitution based on multiple alphabets using a system to switch between them.
- 6. Attempting to break a cryptographic system and return the encrypted message to plaintext.
- 7. Changing the order of items.
- 9. Converting plaintext into ciphertext.
- 11. Converting encrypted info back to it's regular form.
- 14. Scrambling data so that it looks like bubble to anyone except those who know thw trick to decoding it.
- 15. Decrypted or unencrypted data
Down
- 1. Using knowledge about the frequency of letters and groups of letters used in a language to look for patterns.
- 3. Replacement of a character with a different character.
- 4. How many letters the offset should be.
- 5. An encryption methtod in which the pre shared key is used only once.
- 8. Tool to encrypt/decrypt shift ciphers.
- 10. How individuals and organizations reduce the risk of a cyber attack.
- 12. Data that has been encrypted
- 13. You offset the alphabet either to the right (forward) or to the left (backward).