Cryptography

123456789101112131415
Across
  1. 2. Substitution based on multiple alphabets using a system to switch between them.
  2. 6. Attempting to break a cryptographic system and return the encrypted message to plaintext.
  3. 7. Changing the order of items.
  4. 9. Converting plaintext into ciphertext.
  5. 11. Converting encrypted info back to it's regular form.
  6. 14. Scrambling data so that it looks like bubble to anyone except those who know thw trick to decoding it.
  7. 15. Decrypted or unencrypted data
Down
  1. 1. Using knowledge about the frequency of letters and groups of letters used in a language to look for patterns.
  2. 3. Replacement of a character with a different character.
  3. 4. How many letters the offset should be.
  4. 5. An encryption methtod in which the pre shared key is used only once.
  5. 8. Tool to encrypt/decrypt shift ciphers.
  6. 10. How individuals and organizations reduce the risk of a cyber attack.
  7. 12. Data that has been encrypted
  8. 13. You offset the alphabet either to the right (forward) or to the left (backward).